Explore all library
73 to 96 of 177 results
Search results 73 - 96 of 177Category: Security
- COURSETravis Roberts
Deploying and Managing Active Directory DS Domain ControllersIntermediateDuration: 1 hour and 3 minutesAuthor: Travis Roberts; Difficulty: Intermediate; Duration: 1 hour and 3 minutes; Content Topics: Microsoft Azure; This course has: 12 Units - HANDS-ON LABLogan Rakai
Perform a SQL Injection (SQLi) AttackIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps - HANDS-ON LABAdil Islam
Creating Users in Microsoft Entra IDBeginnerDuration: Up to 1 hour and 15 minutesAuthor: Adil Islam; Difficulty: Beginner; Description: Learn how to create new users in Microsoft Entra ID in this hands-on lab.; Duration: Up to 1 hour and 15 minutes; Content Topics: Microsoft Azure; This hands-on lab has: 3 Lab steps - HANDS-ON LABAdil Islam
Using Conditional Access Policies to Enable Microsoft Entra ID Multi-Factor AuthenticationBeginnerDuration: Up to 1 hour and 15 minutesAuthor: Adil Islam; Difficulty: Beginner; Description: Learn how to require multi-factor authentication (MFA) for your users with specific sign-in events using Microsoft Entra ID Conditional Access Policies in this hands-on lab.; Duration: Up to 1 hour and 15 minutes; Content Topics: Microsoft Azure; This hands-on lab has: 4 Lab steps - HANDS-ON LABParveen Singh
Advanced Threat Hunting in Microsoft SentinelIntermediateDuration: Up to 1 hourAuthor: Parveen Singh; Difficulty: Intermediate; Description: Learn how to hunt for potential threats and generate incidents from bookmarks in your Azure Environments using Microsoft Sentinel in this hands-on lab.; Duration: Up to 1 hour; Content Topics: Azure Sentinel; This hands-on lab has: 4 Lab steps - LAB CHALLENGEParveen Singh
Azure Sentinel Incident Triage ChallengeIntermediateDuration: Up to 1 hour and 30 minutesAuthor: Parveen Singh; Difficulty: Intermediate; Description: Put your Azure Sentinel skills to the test as you triage incidents in this hands-on lab challenge.; Duration: Up to 1 hour and 30 minutes; Content Topics: Azure Sentinel; This lab challenge has: 2 Lab steps - HANDS-ON LABParveen Singh
Investigating Security Events using Microsoft SentinelIntermediateDuration: Up to 1 hour and 30 minutesAuthor: Parveen Singh; Difficulty: Intermediate; Description: Learn how to investigate security attacks on a Windows virtual machine using Microsoft Sentinel Analytics Rule in this hands-on lab.; Duration: Up to 1 hour and 30 minutes; Content Topics: Azure Sentinel; This hands-on lab has: 6 Lab steps - COURSENikto Web App Scanner: The BasicsBeginnerDuration: 3 minutes and 21 secondsDifficulty: Beginner; Duration: 3 minutes and 21 seconds; Content Topics: Security; This course has: 1 Unit
- COURSEJorge Negrón
Automating and Centralizing Security Checks with AWS Security HubBeginnerDuration: 19 minutes and 30 secondsAuthor: Jorge Negrón; Difficulty: Beginner; Duration: 19 minutes and 30 seconds; Content Topics: Security; This course has: 10 Units - HANDS-ON LABRichard Beck
OWASP Exercises: Dictionary Attack using HydraIntermediateDuration: Up to 40 minutesAuthor: Richard Beck; Difficulty: Intermediate; Description: In this lab, you'll learn how to set up Hydra to perform a dictionary attack on a website.; Duration: Up to 40 minutes; Content Topics: Security attacks; This hands-on lab has: 3 Lab steps - HANDS-ON LABRichard Beck
OWASP Exercises: Command ExecutionIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: This lab shows how to manage the security level of a DVWA application and how to perform a Command Execution attack from a DVWA application.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 4 Lab steps - HANDS-ON LABLogan Rakai
Execute a Stored Cross-Site Scripting (XSS) AttackIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps - HANDS-ON LABLogan Rakai
Exploiting Vulnerable Network File System (NFS) SharesIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps - COURSEShabaz DarrManaging FSLogix on Azure Virtual DesktopIntermediateDuration: 15 minutes and 59 secondsAuthor: Shabaz Darr; Difficulty: Intermediate; Duration: 15 minutes and 59 seconds; Content Topics: Security; This course has: 7 Units
- COURSELee Mucciarone
Configuring and Managing User and Admin Consent in Microsoft Entra IDIntermediateDuration: 10 minutes and 50 secondsAuthor: Lee Mucciarone; Difficulty: Intermediate; Duration: 10 minutes and 50 seconds; Content Topics: Microsoft Azure; This course has: 4 Units - LEARNING PATHAtil Samancioglu
Practical Deep Dive into Pentesting & Privilege EscalationIntermediateDuration: Up to 10 hours and 11 minutesAuthor: Atil Samancioglu; Difficulty: Intermediate; Description: Pentesting & Privilege Escalation; Duration: Up to 10 hours and 11 minutes; This learning path has: 8 Courses - LEARNING PATHRoss Leo
CSSLP: Domain 8 - Secure Software Supply ChainAdvancedDuration: Up to 1 hour and 5 minutesAuthor: Ross Leo; Difficulty: Advanced; Description: Would you like to become a Certified Secure Software Lifecycle Professional? Learn more about the CSSLP and get this globally recognized security certification.; Duration: Up to 1 hour and 5 minutes; Content Topics: Security; This learning path has: 5 Courses, 1 Resource, 1 Exam - LEARNING PATHRoss Leo
CSSLP: Domain 7 - Secure Software Deployment, Operations, MaintenanceAdvancedDuration: Up to 1 hour and 34 minutesAuthor: Ross Leo; Difficulty: Advanced; Description: Would you like to become a Certified Secure Software Lifecycle Professional? Learn more about the CSSLP and get this globally recognized security certification.; Duration: Up to 1 hour and 34 minutes; Content Topics: Security; This learning path has: 2 Courses, 1 Resource, 1 Exam - LEARNING PATHRoss Leo
CSSLP: Domain 6 - Secure Software Lifecycle ManagementAdvancedDuration: Up to 1 hour and 22 minutesAuthor: Ross Leo; Difficulty: Advanced; Description: Would you like to become a Certified Secure Software Lifecycle Professional? Learn more about the CSSLP and get this globally recognized security certification.; Duration: Up to 1 hour and 22 minutes; Content Topics: Security; This learning path has: 4 Courses, 1 Resource, 1 Exam - LEARNING PATHRoss Leo
CSSLP: Domain 5 - Secure Software TestingAdvancedDuration: Up to 1 hour and 34 minutesAuthor: Ross Leo; Difficulty: Advanced; Description: Would you like to become a Certified Secure Software Lifecycle Professional? Learn more about the CSSLP and get this globally recognized security certification.; Duration: Up to 1 hour and 34 minutes; Content Topics: Security Assessment and Testing; This learning path has: 2 Courses, 1 Resource, 1 Exam - LEARNING PATHRoss Leo
CSSLP: Domain 4 - Secure Software ImplementationAdvancedDuration: Up to 1 hour and 43 minutesAuthor: Ross Leo; Difficulty: Advanced; Description: Would you like to become a Certified Secure Software Lifecycle Professional? Learn more about the CSSLP and get this globally recognized security certification.; Duration: Up to 1 hour and 43 minutes; Content Topics: Software development security; This learning path has: 3 Courses, 1 Resource, 1 Exam - LEARNING PATHRoss Leo
CSSLP: Domain 2 - Secure Software RequirementsAdvancedDuration: Up to 2 hours and 25 minutesAuthor: Ross Leo; Difficulty: Advanced; Description: Would you like to become a Certified Secure Software Lifecycle Professional? Learn more about the CSSLP and get this globally recognized security certification.; Duration: Up to 2 hours and 25 minutes; Content Topics: Security Governance; This learning path has: 3 Courses, 1 Resource, 2 Exams - HANDS-ON LABAndrew Burchill
Using IAM Roles Anywhere to Access Resources From Outside AWSBeginnerDuration: Up to 1 hour and 30 minutesAuthor: Andrew Burchill; Difficulty: Beginner; Description: Learn how to extend IAM roles and policies to non-AWS workloads in this hands-on lab.; Duration: Up to 1 hour and 30 minutes; Content Topics: Amazon Web Services; This hands-on lab has: 6 Lab steps - COURSEDirBuster Vulnerability Scanner: The BasicsBeginnerDuration: 2 minutes and 47 secondsDifficulty: Beginner; Duration: 2 minutes and 47 seconds; Content Topics: Security; This course has: 1 Unit