Explore all library
121 to 144 of 175 results
Search results 121 - 144 of 175Category: Security
- HANDS-ON LABQAAsymmetric Encryption RSA DemonstrationIntermediateDuration: Up to 1 hourAuthor: QA; Difficulty: Intermediate; Description: This lab demonstrates how RSA can be used to share a secret value using public key cryptography.; Duration: Up to 1 hour; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABLogan RakaiExploiting Remote Procedure Call (RPC) ServicesIntermediateDuration: Up to 40 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 40 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps
- COURSERoss LeoCSSLP Domain 8:3 - Software Development and TestingBeginnerDuration: 3 minutes and 46 secondsAuthor: Ross Leo; Difficulty: Beginner; Duration: 3 minutes and 46 seconds; Content Topics: Security; This course has: 1 Unit
- HANDS-ON LABStefano CascavillaGoogle Cloud KMS PlaygroundBeginnerDuration: Up to 4 hoursAuthor: Stefano Cascavilla; Difficulty: Beginner; Description: Practice your Google Cloud KMS skills in a free rein, empty GCP environment by creating and managing symmetric and asymmetric keys, and VM Disks in any way you see fit.; Duration: Up to 4 hours; Content Topics: Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABQASSL Handshake Analysis using WiresharkIntermediateDuration: Up to 2 hoursAuthor: QA; Difficulty: Intermediate; Description: This lab explores the SSL handshake process at the protocol level and how to extract a file from an SSL conversation using a private key.; Duration: Up to 2 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- COURSERoss LeoCISSP: Domain 7 - Security Operations - Module 2IntermediateDuration: 37 minutes and 3 secondsAuthor: Ross Leo; Difficulty: Intermediate; Duration: 37 minutes and 3 seconds; Content Topics: Security Operations; This course has: 5 Units
- COURSELee MucciaroneContinuous Access Evaluation in Microsoft Entra IDIntermediateDuration: 14 minutes and 40 secondsAuthor: Lee Mucciarone; Difficulty: Intermediate; Duration: 14 minutes and 40 seconds; Content Topics: Microsoft Azure; This course has: 4 Units
- COURSEAlibaba CloudSecuring Your Workloads with Alibaba Cloud SecurityIntermediateDuration: 52 minutes and 35 secondsAuthor: Alibaba Cloud; Difficulty: Intermediate; Duration: 52 minutes and 35 seconds; Content Topics: Security; This course has: 5 Units
- COURSELee MucciaroneImplementing and Managing Cross-Tenant Synchronization in Microsoft Entra IDIntermediateDuration: 18 minutes and 35 secondsAuthor: Lee Mucciarone; Difficulty: Intermediate; Duration: 18 minutes and 35 seconds; Content Topics: Microsoft Azure; This course has: 4 Units
- COURSEAlana LaytonUnderstanding the Benefits and Cost of Amazon GuardDutyBeginnerDuration: 17 minutes and 7 secondsAuthor: Alana Layton; Difficulty: Beginner; Duration: 17 minutes and 7 seconds; Content Topics: Security; This course has: 5 Units
- COURSEAlana LaytonManaging and Remediating Findings in Amazon GuardDutyBeginnerDuration: 15 minutes and 12 secondsAuthor: Alana Layton; Difficulty: Beginner; Duration: 15 minutes and 12 seconds; Content Topics: Security; This course has: 6 Units
- COURSELee MucciaroneConfiguring Authentication Session Management With Microsoft Entra ID Conditional AccessIntermediateDuration: 17 minutes and 35 secondsAuthor: Lee Mucciarone; Difficulty: Intermediate; Duration: 17 minutes and 35 seconds; Content Topics: Microsoft Azure; This course has: 4 Units
- COURSEDavid BedfordAlibaba Security & MonitoringIntermediateDuration: 19 minutes and 25 secondsAuthor: David Bedford; Difficulty: Intermediate; Duration: 19 minutes and 25 seconds; Content Topics: Security; This course has: 3 Units
- HANDS-ON LABQAPerforming FilePwn Using the Man-In-The-Middle Framework (MITMf)IntermediateDuration: Up to 2 hoursAuthor: QA; Difficulty: Intermediate; Description: Demonstrate how an attacker could use the MITMf FilePwn tool to replace a file a user downloads in order to achieve a reverse shell exploitation foothold for the network; Duration: Up to 2 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABQAConfiguring Access Control Lists on Cisco RoutersIntermediateDuration: Up to 3 hoursAuthor: QA; Difficulty: Intermediate; Description: This lab shows you how to configure and deploy Access Control Lists (ACLs) on Cisco routers using Packet Tracer as a virtual environment.; Duration: Up to 3 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABAndrew BurchillUsing IAM Roles Anywhere to Access Resources From Outside AWSBeginnerDuration: Up to 1 hour and 30 minutesAuthor: Andrew Burchill; Difficulty: Beginner; Description: Learn how to extend IAM roles and policies to non-AWS workloads in this hands-on lab.; Duration: Up to 1 hour and 30 minutes; Content Topics: Amazon Web Services; This hands-on lab has: 6 Lab steps
- COURSEAtil SamanciogluPentesting and Privilege Escalation with ArcticIntermediateDuration: 57 minutes and 43 secondsAuthor: Atil Samancioglu; Difficulty: Intermediate; Duration: 57 minutes and 43 seconds; Content Topics: Security Assessment and Testing; This course has: 4 Units
- COURSEAtil SamanciogluPentesting and Privilege Escalation with FristiLeaksIntermediateDuration: 1 hour and 1 minuteAuthor: Atil Samancioglu; Difficulty: Intermediate; Duration: 1 hour and 1 minute; Content Topics: Security Assessment and Testing; This course has: 5 Units
- COURSERoss LeoCSSLP Domain 8:4 - Software Delivery, Operations and MaintenanceBeginnerDuration: 8 minutes and 8 secondsAuthor: Ross Leo; Difficulty: Beginner; Duration: 8 minutes and 8 seconds; Content Topics: Security; This course has: 1 Unit
- HANDS-ON LABQAUsing the Man-In-The-Middle Framework (MITMf) to Bypass HTTPS Strict Transport Security (HSTS)IntermediateDuration: Up to 2 hoursAuthor: QA; Difficulty: Intermediate; Description: This lab will familiarize you with the Man-In-The-Middle framework (MITMf) and how an attacker might use this toolset to attack clients on your network.; Duration: Up to 2 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABParveen SinghUsing Watchlists in Microsoft SentinelIntermediateDuration: Up to 1 hourAuthor: Parveen Singh; Difficulty: Intermediate; Description: Learn how to use watchlists and understand its usage in actively detecting threats under Microsoft Sentinel in this hands-on lab.; Duration: Up to 1 hour; Content Topics: Azure Sentinel; This hands-on lab has: 2 Lab steps
- COURSEJorge NegrónBusiness Continuity and Disaster Recovery for SAP on AWSIntermediateDuration: 34 minutes and 56 secondsAuthor: Jorge Negrón; Difficulty: Intermediate; Duration: 34 minutes and 56 seconds; Content Topics: Business Continuity; This course has: 9 Units
- HANDS-ON LABQAUsing Snort to Detect a Brute Force Hydra AttackIntermediateDuration: Up to 2 hoursAuthor: QA; Difficulty: Intermediate; Description: This lab shows you how Snort, its community ruleset, and custom rules can be used to detect malicious behavior on a network guarded by a pfSense router/IDS.; Duration: Up to 2 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- LEARNING PATHAlana LaytonImplementing intelligent threat detection with Amazon GuardDutyIntermediateDuration: Up to 2 hours and 14 minutesAuthor: Alana Layton; Difficulty: Intermediate; Description: With this course, you'll learn how to protect your AWS accounts by using the intelligent threat detection service, Amazon GuardDuty.; Duration: Up to 2 hours and 14 minutes; Content Topics: Security; This learning path has: 4 Courses, 1 Hands-on lab