Data Security
Showing 25–36 of 50 results
OAuth2 and OpenID Connect: Easy Now
In this session, Roland Guijt will explain the OAuth2 and OpenID Connect duo in a very easy-to-get way and show you how to set up the most simple OAuth/OpenID Connect environment possible.
OS Analysis with Wazuh 4
Want to learn how to detect process-level and file-level attacks? How about automatically blocking data exfiltration over a C2 channel? If so, you're in the right place! In this course you will learn OS Analysis using Wazuh.
PCI DSS v4: What’s New
Version 4.0 of PCI DSS is the first major revision since 2013 and includes 64 new requirements and the option for objective-based security with the customized approach. This course will teach you about all the changes and the transition timeline.
PCI DSS: Achieving and Maintaining Compliance
Achieving PCI DSS compliance can be hard and frustrating. This course provides practical advice for every stage of the compliance journey from working out what compliance means for you, scoping, assessment, and importantly how to stay compliant.
PCI DSS: Infrastructure Security
The first two requirements of PCI DSS version 3.2.1 are to build and maintain secure networks and systems. You'll learn to understand what each requirement asks for and discover practical guidance from experienced PCI assessors.
PCI DSS: Restricting Access to Cardholder Data
Requirements 7, 8 & 9 of PCI DSS version 3.2.1 are to Implement Strong Access Control Measures for logical and physical cardholder data. You'll understand what each requirement asks for and discover practical guidance from experienced PCI assessors.
PCI DSS: Securing Data, Systems, and Applications
Requirements 3 to 6 of PCI DSS version 3.2.1 are to protect cardholder data and maintain a vulnerability management program. You'll understand what each requirement asks for and discover practical guidance from experienced PCI assessors.
PCI DSS: The State of Cardholder Data Attacks
In this course, you’ll learn about the criminals’ ways of working from an experienced (PFI) Forensic Investigator and discover what actually happens in the course of a PCI forensic investigation.
Protecting Sensitive Data From Exposure in ASP.NET 3 and ASP.NET Core 3 Applications
Keeping personal, financial, or other sensitive data secure from theft or exposure takes active management. This course will teach you how to identify sensitive data in your applications and the protection measures that can be used to keep it secure.
Protective Technology with Apache Kafka
Apache Kafka is one of the most popular streaming platforms nowadays. In this course, you will learn the setup, configuration, and validation of Apache Kafka in an enterprise environment.
Salesforce Shield – Data Monitoring and Data Encryption
With Shield, Salesforce has provided a robust feature set that secures the platform. This course will teach you when it’s appropriate to use Shield encryption and how to enable, setup, and configure the platform.
Securing Application Secrets in ASP.NET Core 3
Learn how to protect your passwords, API Keys, and other application secrets in your ASP.NET applications. The secure development practices you will learn make it easier to keep production environments safe from malicious or accidental harm.