Cybersecurity
Showing 217–228 of 1317 results
Configuring Firepower Threat Defense (FTD) Integrations
This course will teach you how to integrate Firepower Threat Defense with various external systems.
Configuring Firepower Threat Defense (FTD) NetOps Features
This course will teach you how to configure features in Firepower Threat Defense that are essential to network operations.
Configuring Governance and Compliance for Microsoft Teams and Microsoft 365 Groups
Microsoft Teams is the fastest growing Microsoft 365 service of all time. In this course, you will learn how to manage governance and compliance for Microsoft Teams as well as its underlying membership service, Microsoft 365 Groups.
Configuring Juniper Security Services
This course focuses on teaching some of the features of Juniper Connected Security including Intrusion Detection and Prevention (IDP), integrated user firewall, Unified Threat Management (UTM), and their Sky ATP service.
Configuring Microsoft Azure Active Directory Privileged Identity Management
In this course, Configuring Microsoft Azure Active Directory Privileged Identity Management, you learn how to apply and monitor least-privilege security for Azure Active Directory and your Azure subscriptions.
Configuring Security Headers in ASP.NET 4 and ASP.NET Core 3 Applications
After watching this course you'll have the knowledge and skills to mitigate common browser attacks by setting HTTP headers. The code samples are in ASP.NET Core and ASP.NET for .NET Framework.
Configuring Security Services and Policies in Microsoft Azure
Securing the cloud effectively is a daunting challenge. Microsoft Azure has native tools to improve your security posture. In this course, you'll learn about Azure Security Center, Policies, and Monitor to improve the security of your environment.
Configuring Threat Intelligence in Splunk Enterprise Security
Splunk Enterprise Security is a premium application used within the Splunk deployment to help with SOC operations. This course will teach you how to configure various threat intelligence sources for use within Splunk Enterprise Security.
Configuring Windows Server 2019 EFS and BitLocker Encryption
Windows Server 2019 provides many security tools. This course will teach you how to plan, implement and manage secure operating system boot using BitLocker, as well as protecting data at rest using encrypting file system (EFS) and BitLocker.
ConnectWise ScreenConnect Vulnerability: What You Should Know
Q&A session discussing the ConnectWise ScreenConnect Authentication ByPass vulnerability.
Container Infrastructure Analysis with kube-hunter
Want to learn how to analyze (and prevent) security weaknesses in Kubernetes? If so, you're in the right place! In this course, you will learn Container Infrastructure Analysis with kube-hunter.
Container Security: A Five Year Perspective
This talk is about the successes, failures, the ones that got away, and the work we still haven’t done in the fast moving field of container security.