Cybersecurity
Showing 1009–1020 of 1211 results
Security Event Triage: Analyzing Live System Process and Files
Traditional forensic analysis on endpoints is outpaced by modern attack techniques. This course will teach you how to efficiently identify and investigate malicious activity by performing live system analysis on processes and files.
Security Event Triage: Monitoring Network Application Services
Exploited network application services allow a malicious actor to establish covert channels and silently exfiltrate data. This course will show you how to use the service logs to quickly detect these attacks and closedown the open threat vectors.
Security for Hackers and Developers: Code Auditing
Did you know that bugs in software costs the economy billions of dollars a year? In this course, you are going to help turn the tide as you learn how to find and fix critical bugs quicker.
Security for Hackers and Developers: Exploit Development
Developers are busy, but understanding how to exploit software will help you properly prioritize security critical bugs. This course will teach you basic exploits, shellcoding, and return-oriented programming (ROP).
Security for Hackers and Developers: Fuzzing
Fuzzing is a critical part of the security development lifecycle. This particular technique is used by hackers to find bugs. In this course, software makers will learn how to fuzz - before the bad guys do.
Security for Hackers and Developers: Overview
Enterprises around the world are concerned about cyber security. This course will teach you the fundamentals of information security applicable in any software development discipline.
Security for Hackers and Developers: Reverse Engineering
In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.
Security Framework: NIST CSF
This course will teach you about the NIST CSF 2.0. The controls at the core provide a set of best practices, and the tiers allow you to set the level you intend to implement the controls.
Security Framework: NIST RMF
In this course, you'll learn the foundations of how the NIST Risk Management Framework can help you protect data, in a balance of security, functionality, compliance, and competing resources.
Security Governance: FISMA
This course will teach you about the Federal Information Security Management Act that protects the agencies of the federal government.
Security Hot Takes: Aliquippa Water Authority Breach
This course discusses the what, where and how of the Aliquippa Water Authority Breach, which has been widely attributed to the Cyber Av3ngers hacktivist group.
Security Hot Takes: Buzzwords and Predictions
Zero Trust? Single pane of glass? XDR? Join us as we discuss the top buzzwords of 2023 and predict whether they will be game changers in the cybersecurity industry or simply be that, a buzzword.