Cybersecurity
Showing 673–684 of 1317 results
Juniper Networks JNCIA-Junos: Configuration Basics
This course will teach you how to get the basics of a new Juniper device configured and monitor it as part of your production network.
Kali Linux Concepts and Basic Functionality
This course will teach you about Kali Linux, a popular tool used to discover threats and vulnerabilities in computer systems and networks.
Kali Linux hacker tools, tricks and techniques
Learn Kali linux foundational skills to work flawlessly. A beginner course for ethical hackers who is new for Kali Linux
Kerberos for Beginners: Intro to Network Authentication Protocol
An introductory course on the Kerberos authentication protocol, focusing on its principles, configuration, and security features.
Keycloak – Open Source Identity and Access Management
This Basic Keycloak Course will provide you a good foundation to leverage Keycloak in your Projects
Kubernetes on Windows Vulnerability: What You Should Know
Q&A session discussing the Kubernetes on Windows Vulnerability, CVE-2023-3676.
Kubernetes Security: Cluster Hardening
This course will teach you how to secure your Kubernetes clusters for production workloads.
Kubernetes Security: Implementing Supply Chain Security
Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. This course will teach you the concepts for securing the Kubernetes supply chain.
Kubernetes Security: Minimizing Microservice Vulnerabilities
Microservices are secured via both code and infrastructure. This course will teach you how to secure microservices hosted within a Kubernetes environment.
Kubernetes Security: System Hardening
This course will teach you the concepts for securing the Kubernetes underlying infrastructure.
Lateral Movement with CrackMapExec
Large companies mostly rely on Windows domains for their day to day. In this course, you will learn how to leverage CrackMapExec to perform lateral movement techniques during a Red Team engagement.
Lateral Movement with Infection Monkey
Learn to map and compromise vulnerable network paths with a real propagating payload and correlate lateral movement testing with MITRE ATT&CK and Zero Trust Principles.