Cybersecurity
Showing 25–36 of 1317 results
Advanced Web Application Penetration Testing with Burp Suite
Burp suite can help improve your penetration testing. This is an advanced course designed to expand your knowledge of the Burp Suite product to utilize many of the lesser known features offered in the tool.
AI: GitHub Enterprise
Master GitHub Enterprise administration and enable secure software development across your organization. Learn best practices for user management, permissions, policies, and more.
AI: GitHub Enterprise
Master GitHub Enterprise administration and enable secure software development across your organization. Learn best practices for user management, permissions, policies, and more.
Algorithms for Cryptography
A short course will run you through the a few of most important cryptographic protocols.
Amazon Virtual Private Cloud (AWS VPC) – compact course
aws vpc, network security, cidr blocks, nat gateway, internet gateway, subnets, flow logs
Americas Keynote: Security Learns to Spring: DevSecOps
This talk will argue that DevOps could be the best thing to happen to application security since OWASP if developers and operations teams are enabled to make security a part of their everyday work.
Americas Panel: Lessons Learned from the DevSecOps Trenches
This panel is made up of practitioners who lead application security teams at the forefront of the DevSecOps shift. We will share a number of lessons learned the hard way to adapt security programs.
AnahuacX: Digital Shield: Cybersecurity for Data and System Protection
This course empowers you with the knowledge to protect systems, networks, and data, develop skills to adequately respond to cyberattacks, understand the risks of cybersecurity, and identify vulnerabilities while managing information security.
AnahuacX: Digital Shield: Cybersecurity for Data and System Protection
This course empowers you with the knowledge to protect systems, networks, and data, develop skills to adequately respond to cyberattacks, understand the risks of cybersecurity, and identify vulnerabilities while managing information security.
Analyze Network Event Activity Data with Elasticsearch
As our infrastructures grow, the quality of our data from these devices is becoming critical to cyber operations. This course will teach you how to ingest and use network event and telemetry data for threat hunting operations.
Analyzing and Decrypting TLS with Wireshark
This course will teach you how the primary encryption protocol used on the internet, TLS, operates. You’ll learn about the process and all the protocols involved in encryption using TLS.
Analyzing Malware for .NET and Java Binaries
This course will teach the basics of Java and .NET runtimes, introduce tools and techniques for effectively reverse engineering these binary types, show you how to identify indicators of compromise, and get hands-on with real world malware.