Cybersecurity
Showing 409–420 of 1211 results
Exploring Juniper SRX Networking Features
This course focuses on teaching the student some of the features of Juniper Connected Security including Network Address Translation (NAT), Virtual Private Networks (VPN) as well as reviewing some of the commonly used J-Web monitoring features.
Exploring the Benefits of Continuous Security and Compliance for Cloud Infrastructure
Learn how Cloud Architects and DevSecOps teams can bring continuous security awareness, visibility and fixes to their cloud infrastructure and services for governance and operational excellence, helping to reduce misconfiguration and security gaps.
Exploring the Hidden Gems of Sysinternals Toolkit
The most used troubleshooting toolkit in the world has more than a hundred tools. This course will reveal hidden gems in the kit that we haven't looked at during the learning path.
Extensions, Frameworks, & Integrations Used with Zeek
Zeek is a customizable, open-source tool that allows you to monitor the network and analyze events within it. This course will teach how to integrate it with other tools such as Security Onion, Elasticsearch, and Arkime.
Extensions, Frameworks, and Integrations Used with Snort
Snort is the foremost Intrusion Prevention System (IPS) in the world. This course will teach you how to expand its use and capabilities, as well as how to more efficiently manage it.
F5 BIG-IP Fundamentals
When someone is trying to access an application that you are delivering, they expect it to always be available. This course will teach you how to leverage the F5 BIG-IP appliance to keep your applications available and secure.
Fear and Loathing in Cyber Security: An Analysis of the Psychology of Fear
This engaging talk draws on extensive research in the sociology and psychology of fear.
File Analysis with CyberChef
When performing security investigations on suspicious activity within your network, there may be times where you need to dig a bit deeper into encoded files or malicious registry entries to determine if they are truly nefarious. In this course, you will learn secure cryptography forensic techniques using CyberChef.
File Analysis with LOKI
LOKI is an open-source Indicator of Compromise (IOC) scanner utilizing YARA rules with complex sets of characteristics, file hashes, and patterns for malware identification and classification. It includes a predefined rule set and allows user additions.
File Analysis with TruffleHog
In this course, you will learn to perform file analysis of source code repositories using the tool TruffleHog, which is one of the essential steps of continuous data loss detection and prevention
Fileless Malware
In this course, you’ll learn about fileless malware, why it is used by attackers and the different strategies that can be taken to defend against it.
Fireside Chat: Reality Check on Deep Fakes
Join security advocate Alyssa Miller, journalist J.M. Porup, and privacy & patient rights advocate Andrea Downing for this open conversation about deep fakes.