Explore all library
121 to 144 of 171 results
Search results 121 - 144 of 171Category: Security
- COURSERoss LeoCISSP: Domain 7 - Security Operations - Module 2IntermediateDuration: 37 minutes and 3 secondsAuthor: Ross Leo; Difficulty: Intermediate; Duration: 37 minutes and 3 seconds; Content Topics: Security Operations; This course has: 5 Lectures
- COURSEAlibaba CloudSecuring Your Workloads with Alibaba Cloud SecurityIntermediateDuration: 52 minutes and 35 secondsAuthor: Alibaba Cloud; Difficulty: Intermediate; Duration: 52 minutes and 35 seconds; Content Topics: Security; This course has: 5 Lectures
- COURSELee MucciaroneConfiguring and Managing User and Admin Consent in Microsoft Entra IDIntermediateDuration: 10 minutes and 50 secondsAuthor: Lee Mucciarone; Difficulty: Intermediate; Duration: 10 minutes and 50 seconds; Content Topics: Identity and Access Management; This course has: 4 Lectures
- COURSEAlana LaytonUnderstanding the Benefits and Cost of Amazon GuardDutyBeginnerDuration: 17 minutes and 7 secondsAuthor: Alana Layton; Difficulty: Beginner; Duration: 17 minutes and 7 seconds; Content Topics: Security; This course has: 5 Lectures
- COURSEAlana LaytonManaging and Remediating Findings in Amazon GuardDutyBeginnerDuration: 15 minutes and 12 secondsAuthor: Alana Layton; Difficulty: Beginner; Duration: 15 minutes and 12 seconds; Content Topics: Security; This course has: 6 Lectures
- COURSELee MucciaroneConfiguring Authentication Session Management With Microsoft Entra ID Conditional AccessIntermediateDuration: 17 minutes and 35 secondsAuthor: Lee Mucciarone; Difficulty: Intermediate; Duration: 17 minutes and 35 seconds; Content Topics: Identity and Access Management; This course has: 4 Lectures
- COURSEHallam WebberConfiguring Microsoft Entra ID User Authentication for Windows and Linux Virtual Machines on AzureIntermediateDuration: 13 minutes and 40 secondsAuthor: Hallam Webber; Difficulty: Intermediate; Duration: 13 minutes and 40 seconds; Content Topics: Identity and Access Management; This course has: 4 Lectures
- COURSEAlana LaytonConfiguring Accounts and Permissions in Amazon GuardDutyBeginnerDuration: 22 minutes and 34 secondsAuthor: Alana Layton; Difficulty: Beginner; Duration: 22 minutes and 34 seconds; Content Topics: Security; This course has: 6 Lectures
- COURSEDavid BedfordAlibaba Security & MonitoringIntermediateDuration: 19 minutes and 25 secondsAuthor: David Bedford; Difficulty: Intermediate; Duration: 19 minutes and 25 seconds; Content Topics: Security; This course has: 3 Lectures
- LEARNING PATHRoss LeoCSSLP: Domain 6 - Secure Software Lifecycle ManagementAdvancedDuration: Up to 1 hour and 22 minutesAuthor: Ross Leo; Difficulty: Advanced; Description: Would you like to become a Certified Secure Software Lifecycle Professional? Learn more about the CSSLP and get this globally recognized security certification.; Duration: Up to 1 hour and 22 minutes; Content Topics: Security; This learning path has: 4 Courses, 1 Resource, 1 Exam
- HANDS-ON LABQAPerforming FilePwn Using the Man-In-The-Middle Framework (MITMf)IntermediateDuration: Up to 2 hoursAuthor: QA; Difficulty: Intermediate; Description: Demonstrate how an attacker could use the MITMf FilePwn tool to replace a file a user downloads in order to achieve a reverse shell exploitation foothold for the network; Duration: Up to 2 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABQAConfiguring Access Control Lists on Cisco RoutersIntermediateDuration: Up to 3 hoursAuthor: QA; Difficulty: Intermediate; Description: This lab shows you how to configure and deploy Access Control Lists (ACLs) on Cisco routers using Packet Tracer as a virtual environment.; Duration: Up to 3 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABAndrew BurchillUsing IAM Roles Anywhere to Access Resources From Outside AWSBeginnerDuration: Up to 1 hour and 30 minutesAuthor: Andrew Burchill; Difficulty: Beginner; Description: Learn how to extend IAM roles and policies to non-AWS workloads in this hands-on lab.; Duration: Up to 1 hour and 30 minutes; Content Topics: Amazon Web Services; This hands-on lab has: 6 Lab steps
- HANDS-ON LABParveen SinghUsing Watchlists in Microsoft SentinelIntermediateDuration: Up to 1 hourAuthor: Parveen Singh; Difficulty: Intermediate; Description: Learn how to use watchlists and understand its usage in actively detecting threats under Microsoft Sentinel in this hands-on lab.; Duration: Up to 1 hour; Content Topics: Security; This hands-on lab has: 2 Lab steps
- COURSEThomas MitchellActivity Alerts and Alert Triggers in Microsoft Entra Permissions ManagementIntermediateAuthor: Thomas Mitchell; Difficulty: Intermediate; Content Topics: Security; This course has: 6 Lectures
- COURSEAtil SamanciogluPentesting and Privilege Escalation with ArcticIntermediateDuration: 57 minutes and 43 secondsAuthor: Atil Samancioglu; Difficulty: Intermediate; Duration: 57 minutes and 43 seconds; Content Topics: Security Assessment and Testing; This course has: 4 Lectures
- COURSEAtil SamanciogluPentesting and Privilege Escalation with FristiLeaksIntermediateDuration: 1 hour and 1 minuteAuthor: Atil Samancioglu; Difficulty: Intermediate; Duration: 1 hour and 1 minute; Content Topics: Security Assessment and Testing; This course has: 5 Lectures
- COURSERoss LeoCSSLP Domain 8:4 - Software Delivery, Operations and MaintenanceBeginnerDuration: 8 minutes and 8 secondsAuthor: Ross Leo; Difficulty: Beginner; Duration: 8 minutes and 8 seconds; Content Topics: Security; This course has: 1 Lecture
- HANDS-ON LABQAUsing the Man-In-The-Middle Framework (MITMf) to Bypass HTTPS Strict Transport Security (HSTS)IntermediateDuration: Up to 2 hoursAuthor: QA; Difficulty: Intermediate; Description: This lab will familiarize you with the Man-In-The-Middle framework (MITMf) and how an attacker might use this toolset to attack clients on your network.; Duration: Up to 2 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABQAAsymmetric Encryption RSA DemonstrationIntermediateDuration: Up to 1 hourAuthor: QA; Difficulty: Intermediate; Description: This lab demonstrates how RSA can be used to share a secret value using public key cryptography.; Duration: Up to 1 hour; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- COURSEJorge NegrónBusiness Continuity and Disaster Recovery for SAP on AWSIntermediateDuration: 34 minutes and 56 secondsAuthor: Jorge Negrón; Difficulty: Intermediate; Duration: 34 minutes and 56 seconds; Content Topics: Business Continuity; This course has: 9 Lectures
- HANDS-ON LABQAUsing Snort to Detect a Brute Force Hydra AttackIntermediateDuration: Up to 2 hoursAuthor: QA; Difficulty: Intermediate; Description: This lab shows you how Snort, its community ruleset, and custom rules can be used to detect malicious behavior on a network guarded by a pfSense router/IDS.; Duration: Up to 2 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- LEARNING PATHAlana LaytonImplementing intelligent threat detection with Amazon GuardDutyIntermediateDuration: Up to 2 hours and 14 minutesAuthor: Alana Layton; Difficulty: Intermediate; Description: With this course, you'll learn how to protect your AWS accounts by using the intelligent threat detection service, Amazon GuardDuty.; Duration: Up to 2 hours and 14 minutes; Content Topics: Security; This learning path has: 4 Courses, 1 Hands-on lab
- HANDS-ON LABQADictionary Attacking a Web Application with Hydra and Burp SuiteIntermediateDuration: Up to 2 hoursAuthor: QA; Difficulty: Intermediate; Description: The lab demonstrates how to use Hydra and Burp Suite to attack a web-based login service by performing a dictionary attack on the DVWA login web-app.; Duration: Up to 2 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps