Cybersecurity
Showing 709–720 of 1317 results
LinuxFoundationX: Introduction to DevSecOps for Managers
Get an overview of the history, terminology, processes, and tools used to adopt Continuous Delivery and DevSecOps within any organization.
LinuxFoundationX: Introduction to Istio
Service meshes are becoming a vital component of a company’s infrastructure. This course teaches you how to monitor, connect, and secure microservices using Istio service mesh, the most widely adopted service mesh in production.
LinuxFoundationX: Introduction to Serverless on Kubernetes
Learn how to build serverless functions that can be run on any cloud, without being restricted by limits on the execution duration, languages available, or the size of your code.
LinuxFoundationX: PyTorch and Deep Learning for Decision Makers
Learn how PyTorch, a deep learning framework, can be used to automate and optimize processes through the development and deployment of state-of-the-art AI applications. The course will also help you understand the importance of data quality, how to choose the right model, and the challenges in deploying and maintaining both deep learning and machine learning applications.
LinuxFoundationX: Secure Software Development: Implementation
Learn the practical steps software developers can take, even if they have limited resources, to implement secure software.
LinuxFoundationX: Secure Software Development: Requirements, Design, and Reuse
Learn the security basics that allow you to develop software that is hardened against attacks, and understand how you can reduce the damage and speed the response when a vulnerability is exploited.
LinuxFoundationX: Securing Your Software Supply Chain with Sigstore
Gain the knowledge and skills necessary to secure the integrity of your software by leveraging the Sigstore toolkit, a free and open source project that offers automated signing and verification across release files, container images, binaries, bill of material manifests, and more.
Listeners and Payloads with Cobalt Strike
Cobalt Strike is a powerful Command and Control Framework developed by Raphael Mudge and currently owned and supported by HelpSystems. It is designed to allow Red Team Operators to share connections and collections across an operation.
Live Response and Forensics with PowerShell
This course will teach you how to use PowerShell for performing initial security triage on workstations and disk forensics.
Log4j Vulnerability Lab: Video Walkthrough
This video walkthrough course is designed to be a companion video for the Log4j Vulnerability Lab: Emulation and Detection.
Log4j Vulnerability: What You Should Know
This course is a Q&A session discussing the Log4j vulnerability, known as Log4Shell.
Logging and Monitoring in Google Cloud
This course teaches participants techniques for monitoring and improving infrastructure and application performance in Google Cloud.