Data Security
Showing 37–48 of 50 results
Securing SQL Server Applications
Dive deep into SQL Server application security! Learn vital techniques to protect data, detect vulnerabilities, and implement robust security practices to safeguard your applications.
Securing SSRS Reporting Solutions
SSRS uses a role-based security architecture for administrative tasks and access to items published to the report server. This course will teach you how to use all SSRS security features for a native mode report server.
Security for Hackers and Developers: Code Auditing
Did you know that bugs in software costs the economy billions of dollars a year? In this course, you are going to help turn the tide as you learn how to find and fix critical bugs quicker.
Security for Hackers and Developers: Exploit Development
Developers are busy, but understanding how to exploit software will help you properly prioritize security critical bugs. This course will teach you basic exploits, shellcoding, and return-oriented programming (ROP).
Security for Hackers and Developers: Fuzzing
Fuzzing is a critical part of the security development lifecycle. This particular technique is used by hackers to find bugs. In this course, software makers will learn how to fuzz - before the bad guys do.
Security for Hackers and Developers: Overview
Enterprises around the world are concerned about cyber security. This course will teach you the fundamentals of information security applicable in any software development discipline.
Security for Hackers and Developers: Reverse Engineering
In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.
SnowPro Advanced Data Engineer: Security
This course introduces Snowflake’s security model and features, which are critical for performing data engineering tasks and keeping your data and account safe. They are required components of the SnowPro Data Engineer exam.
Specialized Attacks: OT and ICS
This course will teach you how to perform reconnaissance, analyze network protocols, and conduct attacks against Operational Technology. This will show how weak cyber security in OT environments can significantly disrupt manufacturing operations.
Specialized Hunts: Threat Hunting within Active Directory
Active Directory is used in most medium and large companies, making it a significant target for abuse. This course will teach you how to hunt for threats in Active Directory to uncover malicious activity rapidly, allowing you to respond faster
Technical Information Gathering with Recon-ng 5
Recon-ng automates technical information gathering to drastically reduce the time spent conducting reconnaissance during Red Team engagements. Streamline your methodology with the next generation of open source information gathering capability.
Threat Hunting with PySpark
In this demo, you'll learn how to perform advanced graph analytics on disparate windows log data to identify anomalies.