Cybersecurity
Showing 157–168 of 1317 results
Cloud Computing Fundamentals: Governance, Risk, Compliance, and Security
This course will teach you the fundamental knowledge needed to understand the essentials of cloud Governance, Risk, Compliance, and Security.
Cloud Data Security for CCSP®
This course will teach you the principles and techniques to provide data security in cloud-based systems needed for the CCSP Certified Cloud Security Professional exam.
Cloud Infrastructure Analysis with Prowler
In this course, you will learn to perform AWS cloud security assessments using the tool Prowler, which is one of the first essential steps to continuous security in the cloud.
Cloud Infrastructure Analysis with Scout Suite
With cloud services exploding in numbers and complexity, it is impossible to manually identify all dangerous configurations. With Scout Suite, you will find those dangerous configurations, and then resolve them on an AWS environment.
Cloud Security Operations for CCSP®
This course will teach you security operations responsibilities related to the consumer needed for the CCSP exam.
Collection Is Not Detection and Other Rules for Modernising Sec Ops
In this talk, Sarah Young will discuss how security operations change from on-prem to the cloud and how to optimize your security operations in a hybrid environment to make use of modern tooling such as automation and AI/ML.
Collection with PowerSploit
In this course, we'll explore the language of logic and deductive reasoning. Completing this course will grant you the knowledge needed to make better decisions.
Collection with PowerUpSQL
In a red team engagement, it is crucial to collect sensitive information to demonstrate the impact of a cyber attack to your client. This course will teach you how to collect sensitive data from Microsoft SQL databases using the PowerUpSQL tool.
Command and Control with Covenant
Covenant C2 command and control uses just-in-time, in-memory, .NET compilation, and dynamic profiles to fool defensive detections. Skill up your red team techniques by leveraging the next generation of adversary command and control capabilities.
Command and Control with Empire
PowerShell has quickly become the standard in enterprise networks. In this course you will learn how to leverage Empire to perform command and control techniques during a red team engagement.
Command and Control with Merlin
In this course, you will learn Command And Control using Merlin. Merlin’s “magic” is in the usage of modules (for attack automation), HTTP/3 (for evading packet inspection), and Golang (for cross-compiling agents on multiple Operating Systems).
Command and Control with PoshC2
PoshC2 is a powerful tool that uses PowerShell to control a victim system toward furthering red teaming objectives beyond exploitation throughout the remaining life of an engagement. In this course, you will learn Command and Control using PoshC2.