Cybersecurity
Showing 25–36 of 1211 results
AI: GitHub Enterprise
Master GitHub Enterprise administration and enable secure software development across your organization. Learn best practices for user management, permissions, policies, and more.
Algorithms for Cryptography
A short course will run you through the a few of most important cryptographic protocols.
Amazon Virtual Private Cloud (AWS VPC) – compact course
aws vpc, network security, cidr blocks, nat gateway, internet gateway, subnets, flow logs
Americas Keynote: Security Learns to Spring: DevSecOps
This talk will argue that DevOps could be the best thing to happen to application security since OWASP if developers and operations teams are enabled to make security a part of their everyday work.
Americas Panel: Lessons Learned from the DevSecOps Trenches
This panel is made up of practitioners who lead application security teams at the forefront of the DevSecOps shift. We will share a number of lessons learned the hard way to adapt security programs.
AnahuacX: Digital Shield: Cybersecurity for Data and System Protection
This course empowers you with the knowledge to protect systems, networks, and data, develop skills to adequately respond to cyberattacks, understand the risks of cybersecurity, and identify vulnerabilities while managing information security.
AnahuacX: Digital Shield: Cybersecurity for Data and System Protection
This course empowers you with the knowledge to protect systems, networks, and data, develop skills to adequately respond to cyberattacks, understand the risks of cybersecurity, and identify vulnerabilities while managing information security.
Analyze Network Event Activity Data with Elasticsearch
As our infrastructures grow, the quality of our data from these devices is becoming critical to cyber operations. This course will teach you how to ingest and use network event and telemetry data for threat hunting operations.
Analyzing and Decrypting TLS with Wireshark
This course will teach you how the primary encryption protocol used on the internet, TLS, operates. You’ll learn about the process and all the protocols involved in encryption using TLS.
Analyzing Security Threats
Learn techniques for identifying, analyzing, and responding to various types of security threats.
Android 4 Security: Effective Permission Handling
Permissions play a key role in guarding user privacy and data for Android apps. This course will give you a deep understanding of how permissions work, how to request permissions, and how to avoid accidental data leaks when using permissions.
Android 5 Security: Inter-app and Network Communication Security
This course will give you a better understanding of how you can ensure that your app’s interaction with other apps is secure and how to configure your app so that the network requests being made from it are not prone to attacks by malicious entities.