Cybersecurity
Showing 325–336 of 1317 results
Detecting Anomalies and Events with Packetbeat
In this course, you will learn the setup, configuration, and validation of Packetbeats in an enterprise environment. We will also cover some practical network and security use cases, as well as create custom alerts.
Detecting Anomalies and Events with Winlogbeat
Winlogbeat is an open-source log collector that ships Windows Event Logs to Elasticsearch or Logstash. In this course, you will learn the setup, configuration, and validation of Winlogbeat in an enterprise environment.
Dev-first Security: Learning from the Pioneers
This talk shares practices and learnings from companies with forward thinking security teams. You'll also hear practical tips and tricks from these leaders and a broader view on dev-first security.
Developer Security Champion: API Security
This course will teach you about securing web-based APIs. It’ll get you thinking about attacks, defenses, and the resources you should be using.
Developer Security Champion: Data Protection Standards
Dive into data protection standards! This course will teach you how developers become security champions, mastering PII, PHI, PCI, and integration strategies.
Developer Security Champion: Encrypted Communications
Almost all apps are connected to other apps and users. Securing that connection is more important than ever before. This course will teach you how to encrypt the connections from and to users, infrastructure dependencies and other applications.
Developer Security Champion: OWASP Top 10
This course will teach you more about the OWASP Top 10, how it relates to security in an organization, and how it can be integrated into your everyday job functions as a developer.
Developer Security Champion: Secure Authentication Implementation
This course will teach you the key considerations for authentication in software applications. It will guide on best practice and common problems you’ll face when using authentication in your applications.
Developer Security Champion: Vulnerability Testing
Many security weaknesses in software can be detected more or less automatically. This course will teach you vulnerability testing.
Developer’s guide to Blockchain
A complete guide on Blockchain for beginners
Developing and Implementing Vulnerability Management Programs
This course is for Security Managers & CISOs to create, run, and manage their VM program effectively. This course deals with handling vulnerability management, compliance management, risk management, and VAPT in a single integrate framework.
Developing Daemons and Services Protected by Azure Active Directory
Daemons or Services are a big part of any application. This course will teach you how you can securely access Azure AD protected APIs from your services and daemons.