Cybersecurity
Showing 61–72 of 1211 results
Assessing and Mitigating Security Risks
The capacity to perform risk management is crucial for anyone hoping to defend their networks and resources. This course will teach you about risk policy, assessment, analysis, and mitigation of your networks.
Assessing Vulnerabilities and Reducing Risk
Study methods for identifying vulnerabilities and implementing risk reduction strategies in systems.
Assessment/Audit of Security and Privacy Controls for CGRC
This course will teach you the skills of performing an assessment of the security controls for an information system as needed for the Certified in Governance, Risk and Compliance examination.
Asset Security for CISSP®
This course will teach you skills and concepts required to identify and protect the assets of the organization needed for the Certified Information Systems Security Professional (CISSP®)exam.
Asset Security for CISSP®
This course will teach you the principles of asset management and protection that are key parts of information security management.
Atlassian RCE Vulnerabilities: What You Should Know
Q&A session discussing the Atlassian Vulnerabilities, covering deserialization of YAML libraries allowing RCE, template injection, and two different RCEs, CVE-2022-1471,CVE-2023-22522, CVE-2023-22523,CVE-2023-22524.
Attacks and Exploits: Network and Application Attacks for CompTIA Pentest+
In this course you’ll develop the knowledge and skills required to research attack vectors and perform attacks against networks, Wi-Fi assets, and applications in preparation for the CompTIA Pentest+ exam.
Attacks and Exploits: Specialized Attacks and Post Exploitation for CompTIA Pentest+
In this course you’ll develop the knowledge and skills to prepare for the CompTIA Pentest+ exam. You'll learn how to research attack vectors, and conduct physical and social engineering attacks and apply post-exploitation techniques.
Auditing IIS Web Servers for Security and Best Practices
Cyber-attacks are on the rise. Microsoft IIS is used to serve web sites around the world. This course will teach you how to audit your server's security and mitigate common insecure configurations as well as reduce your attack surface.
Authenticating and Securing User Access to Citrix ADC
This course will teach you how to securely control user access to Citrix ADC, focusing on SSO authentication including SAML. Plus, learn about other security features such as authorization, auditing, admin partitions, and Smart Control/SmartAccess.
Authentication and Authorization in PHP
This course will teach you how to implement multiple methods of authentication and authorization in PHP.
Authentication and Authorization Testing with Burp Suite
Authentication and authorization are some of the most important security mechanisms in a web application, since they control the access to the data. This course will teach you how to test those mechanisms using Burp Suite.