Cybersecurity
Showing 205–216 of 1211 results
Configuring Threat Intelligence in Splunk Enterprise Security
Splunk Enterprise Security is a premium application used within the Splunk deployment to help with SOC operations. This course will teach you how to configure various threat intelligence sources for use within Splunk Enterprise Security.
Configuring Windows Server 2019 EFS and BitLocker Encryption
Windows Server 2019 provides many security tools. This course will teach you how to plan, implement and manage secure operating system boot using BitLocker, as well as protecting data at rest using encrypting file system (EFS) and BitLocker.
ConnectWise ScreenConnect Vulnerability: What You Should Know
Q&A session discussing the ConnectWise ScreenConnect Authentication ByPass vulnerability.
Container Infrastructure Analysis with kube-hunter
Want to learn how to analyze (and prevent) security weaknesses in Kubernetes? If so, you're in the right place! In this course, you will learn Container Infrastructure Analysis with kube-hunter.
Container Security: A Five Year Perspective
This talk is about the successes, failures, the ones that got away, and the work we still haven’t done in the fast moving field of container security.
Continuous Monitoring for CGRC
How do you ensure that an information system remains secure throughout its operational life cycle? This course will teach you the skills of continuous monitoring needed for the Certified in Governance, Risk, and Compliance examination.
Convergence of Chaos Engineering and Revolutionized Technology Techniques
In this talk, we are to explore how these emerging paradigms can use Chaos Engineering to manage the pains in the path toward providing a solution.
Creating a Security-centric Culture
In this thought leadership course, you will delve into some fundamental techniques that can be employed to make security the norm rather than the exception.
Credential Access with Cain & Abel
From manipulating network traffic to cracking user credentials, this course will give you the skills and understanding to further your red teaming objectives towards exploitation, credential access, and lateral movement.
Credential Access with LaZagne
In this course, you will learn privilege escalation using LaZagne, a post-exploitation tool used to recover credentials from a system.
Credential Access with Mimikatz 2
In addition to other functionality, Mimikatz extracts password hashes and clear-text credentials from system memory. Mimikatz can also manipulate domain account passwords or display protected credentials stored in files.
Credential Access with Responder
After getting initial access in a network, your next task is to move laterally and escalate privileges. In this course, you will see the Responder tool which allows you to exploit vulnerabilities on the LLMNR and NBT-NS protocols to get credentials