Cyber Security DevOps
Showing 25–36 of 41 results
Secure Software Supply Chain for CSSLP®
This course will teach you to identify, assess, and mitigate the risk associated with the software supply chain needed for the Certified Secure Software Lifecycle Professional examination.
Securing and Integrating Components of your Application
In this course, application developers learn how to design and develop cloud-native applications that seamlessly integrate managed services from Google Cloud.
Security Onion Concepts and Basic Functionality
Security Onion is an open source threat hunting, enterprise security monitoring, and log management tool. This course will teach you the capabilities, configuration, and basic operation of Security Onion.
Security Operations for CySA+
This course will teach you the skills of a security professional needed for the CySA+ Exam.
Shift Left, Shift Right: The DevSecOps Hokey Pokey
Garrett Gross, a Rapid7 Technical Advisor for Application Security, and Alyssa Miller, a Snyk Application Security advocate, come together to share how application security is evolving.
Specialized DFIR: Windows Registry Forensics
The Windows registry is a valuable source of information during a forensic investigation. This course will teach you how to investigate the registry to obtain evidence of malicious execution and persistence.
State of DevOps Report Insights: Integrating Security into the Software Delivery Cycle
This talk will showcase some of the common patterns and practices that highly evolved DevOps shops have in place to enable tighter integration with security and will provide a practical roadmap for adopting and expanding DevOps success.
Talk DevSecOps to Me
This talk digs into the fundamentals of DevSecOps, exploring the key principles required to advance your security practices.
The IT Ops Sessions: Protect Windows Clients with Defender for Endpoint
In this IT Ops session, you’ll learn how Microsoft’s endpoint detection and response platform, Defender for Endpoint, has grown to become a leader in its field.
Threat Hunt with PowerShell
As a defensive security professional, you're responsible for improving defenses by performing threat hunting exercises. This course will teach you how to perform threat hunting with PowerShell within a Microsoft environment.
Threat Hunting: Endpoint Hunting
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through endpoint artifacts to find malicious behavior.
Threat Hunting: Review, Automate, and Improve
What are the follow-on tasks after completing a threat hunt? This course will teach you how to generate tangible outcomes and improve your threat hunting process.