Cybersecurity
Showing 1081–1092 of 1211 results
Start Hacking and Making Money Today at HackerOne
Hack Legally and Get Paid For Your Findings
State of DevOps Report Insights: Integrating Security into the Software Delivery Cycle
This talk will showcase some of the common patterns and practices that highly evolved DevOps shops have in place to enable tighter integration with security and will provide a practical roadmap for adopting and expanding DevOps success.
Staying Secure Everywhere
Cyber-attackers target the business technology we use every day and everywhere. This course will teach you how to be cybersecure and avoid common security problems.
Streamlining Your Incident Response Process with Splunk
In this course, you’ll learn how Splunk can help streamline your incident response (IR) process.
Stuffing Your Cloud into Your SOCs
In this 5-minute session, Brendan O'Connor will talk about stuffing your cloud into SOCs.
Supply Chain Risk Management with OWASP Dependency-Check
Software supply chain risks are a huge security concern today and automated tools are essential to mitigate this threat. In this course, you will learn how to manage this risk by setting up OWASP Dependency-Check scanning on a software project.
Systems Security
Gain insights into systems security practices for protecting critical infrastructure and information systems.
Talk DevSecOps to Me
This talk digs into the fundamentals of DevSecOps, exploring the key principles required to advance your security practices.
Talking Tradecraft @ Pluralsight: A Technical Dive into the Log4Shell Exploit
This course is a technical post-mortem of the Log4Shell vulnerability, discussing the impact that has been seen to date, new developments in the remediation, and what to expect in the future.
Tech Ethics: Executive Briefing
You may have heard of technology ethics, now is your chance to practice it. This course will teach you practical methods of ensuring that tech ethics makes its way into your products and cultures.
Technical Information Gathering with Maltego CE 4
One of the most important phases in a red team engagement is the information gathering prior to the attack. In this course, we explore the Maltego CE tool, which will help you to collect technical and people information from your target.
Technical Information Gathering with Recon-ng 5
Recon-ng automates technical information gathering to drastically reduce the time spent conducting reconnaissance during Red Team engagements. Streamline your methodology with the next generation of open source information gathering capability.