Explore all library
97 to 120 of 171 results
Search results 97 - 120 of 171Category: Security
- COURSERoss LeoSecurity Incident ManagementBeginnerDuration: 17 minutes and 51 secondsAuthor: Ross Leo; Difficulty: Beginner; Duration: 17 minutes and 51 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSEVish ChidambaramOperations SecurityBeginnerDuration: 4 minutes and 55 secondsAuthor: Vish Chidambaram; Difficulty: Beginner; Duration: 4 minutes and 55 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSELee MucciaroneZero Trust MethodologyBeginnerDuration: 6 minutes and 25 secondsAuthor: Lee Mucciarone; Difficulty: Beginner; Duration: 6 minutes and 25 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSETravis RobertsConfiguring and Managing Multi-Site, Multi-Domain, and Multi-Forest Environments in Active DirectoryIntermediateDuration: 42 minutes and 53 secondsAuthor: Travis Roberts; Difficulty: Intermediate; Duration: 42 minutes and 53 seconds; Content Topics: Identity and Access Management; This course has: 9 Lectures
- COURSEAtil SamanciogluDeep Dive into Privilege Escalation on LinuxIntermediateDuration: 2 hours and 29 minutesAuthor: Atil Samancioglu; Difficulty: Intermediate; Duration: 2 hours and 29 minutes; Content Topics: Security Assessment and Testing; This course has: 13 Lectures
- COURSEAtil SamanciogluPentesting and Privilege Escalation with Mr. RobotIntermediateDuration: 1 hour and 21 minutesAuthor: Atil Samancioglu; Difficulty: Intermediate; Duration: 1 hour and 21 minutes; Content Topics: Security Assessment and Testing; This course has: 6 Lectures
- COURSERoss LeoCSSLP Domain 7:2 - Secure Software Operations and MaintenanceBeginnerDuration: 38 minutes and 27 secondsAuthor: Ross Leo; Difficulty: Beginner; Duration: 38 minutes and 27 seconds; Content Topics: Security; This course has: 4 Lectures
- COURSEHallam WebberAuthentication and Access for SAP on AzureIntermediateDuration: 18 minutes and 15 secondsAuthor: Hallam Webber; Difficulty: Intermediate; Duration: 18 minutes and 15 seconds; Content Topics: Security; This course has: 6 Lectures
- COURSEStuart ScottUsing AWS Secrets Manager to Manage, Rotate, and Retrieve SecretsIntermediateDuration: 13 minutes and 59 secondsAuthor: Stuart Scott; Difficulty: Intermediate; Duration: 13 minutes and 59 seconds; Content Topics: Encryption; This course has: 1 Lecture
- COURSEThomas MitchellManaging GCP Operations LoggingIntermediateDuration: 22 minutes and 11 secondsAuthor: Thomas Mitchell; Difficulty: Intermediate; Duration: 22 minutes and 11 seconds; Content Topics: Compliance; This course has: 8 Lectures
- HANDS-ON LABQAConfiguring Active Directory Group PoliciesIntermediateDuration: Up to 2 hoursAuthor: QA; Difficulty: Intermediate; Description: This lab demonstrates how to create and configure a new user and GPO on a Windows 2016 Server Domain Controller (DC).; Duration: Up to 2 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- COURSELee MucciaroneTroubleshooting Azure Active Directory Connect SynchronizationBeginnerDuration: 19 minutes and 18 secondsAuthor: Lee Mucciarone; Difficulty: Beginner; Duration: 19 minutes and 18 seconds; Content Topics: Identity and Access Management; This course has: 5 Lectures
- COURSETravis RobertsDeploying and Managing Active Directory DS Domain ControllersIntermediateDuration: 1 hour and 3 minutesAuthor: Travis Roberts; Difficulty: Intermediate; Duration: 1 hour and 3 minutes; Content Topics: Identity and Access Management; This course has: 12 Lectures
- COURSERoss LeoCSSLP Domain 1:4 Software Development MethodologiesIntermediateDuration: 32 minutes and 8 secondsAuthor: Ross Leo; Difficulty: Intermediate; Duration: 32 minutes and 8 seconds; Content Topics: Software development security; This course has: 5 Lectures
- HANDS-ON LABQACracking Hashes with John the RipperIntermediateDuration: Up to 2 hoursAuthor: QA; Difficulty: Intermediate; Description: This lab demonstrates how compromised hashes can be cracked using John the Ripper.; Duration: Up to 2 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABLogan RakaiPerform a SQL Injection (SQLi) AttackIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABAdil IslamSimplifying Password Reset Using Microsoft Entra ID Self-Service Password ResetBeginnerDuration: Up to 1 hour and 15 minutesAuthor: Adil Islam; Difficulty: Beginner; Description: Learn how to enable end-users to reset forgotten passwords without the need for a call to the help desk using Microsoft Entra ID Self-Service Password Reset in this hands-on lab.; Duration: Up to 1 hour and 15 minutes; Content Topics: Identity and Access Management; This hands-on lab has: 4 Lab steps
- COURSERoss LeoCSSLP Domain 4:3 - Secure Coding OperationsBeginnerDuration: 16 minutes and 17 secondsAuthor: Ross Leo; Difficulty: Beginner; Duration: 16 minutes and 17 seconds; Content Topics: Software development security; This course has: 6 Lectures
- LEARNING PATHRoss LeoCSSLP: Domain 3 - Secure Software Architecture and DesignAdvancedDuration: Up to 4 hours and 1 minuteAuthor: Ross Leo; Difficulty: Advanced; Description: Would you like to become a Certified Secure Software Lifecycle Professional? Learn more about the CSSLP and get this globally recognized security certification.; Duration: Up to 4 hours and 1 minute; Content Topics: Software development security; This learning path has: 4 Courses, 1 Resource, 4 Exams
- HANDS-ON LABQAUsing the Low Orbit Ion Cannon (LOIC) to Perform Denial of Service (DoS) AttacksIntermediateDuration: Up to 2 hoursAuthor: QA; Difficulty: Intermediate; Description: This lab teaches you how to use the Low Orbit Ion Cannon (LOIC) to perform traffic-based Denial of Service (DoS) attacks.; Duration: Up to 2 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABLogan RakaiExploiting Remote Procedure Call (RPC) ServicesIntermediateDuration: Up to 40 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 40 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABLogan RakaiExploiting Vulnerable Network File System (NFS) SharesIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps
- COURSERoss LeoCSSLP Domain 8:3 - Software Development and TestingBeginnerDuration: 3 minutes and 46 secondsAuthor: Ross Leo; Difficulty: Beginner; Duration: 3 minutes and 46 seconds; Content Topics: Security; This course has: 1 Lecture
- HANDS-ON LABStefano CascavillaGoogle Cloud KMS PlaygroundBeginnerDuration: Up to 4 hoursAuthor: Stefano Cascavilla; Difficulty: Beginner; Description: Practice your Google Cloud KMS skills in a free rein, empty GCP environment by creating and managing symmetric and asymmetric keys, and VM Disks in any way you see fit.; Duration: Up to 4 hours; Content Topics: Security; This hands-on lab has: 2 Lab steps