Cybersecurity
Showing 817–828 of 1317 results
Network Discovery and Enumeration with PowerShell
PowerShell is a powerful tool that can help you to enumerate local and remote information during an offensive engagement. This course will teach you how to use PowerShell to perform reconnaissance in a red team scenario.
Network Forensics Examiner
This Free Online Course Includes: 6-10 Hours of Learning CPD Accreditation Final Assessment
Network Intrusion Analysis for Cisco CyberOps Associate
Cybersecurity concepts are fundamental pieces of knowledge necessary to have a career in the industry. This course will detail the network data that you can use for cyber operations and how to use it within your environment.
Network Monitoring and Analysis with Bash
Network traffic and local logs can be a valuable source of information during an incident investigation. This course will teach you how to analyze network traffic with Bash.
Network Pen Testing with Python
A thorough assessment of an environment requires simulating a high volume of offensive techniques within a fixed time frame. This course will teach you how to automate penetration testing with Python.
Network Protocols for Security: DNS
In this course, you’ll practice creating network traffic to analyze how DNS queries and responses operate. When you're finished, you'll have a fundamental understanding on how to find anomalies within DNS.
Network Protocols for Security: HTTP
In this course, you'll practice creating network traffic and inspecting the behavior of web traffic. When you're finished, you'll have a fundamental understanding on how to find anomalies within HTTP.
Network Protocols for Security: ICMP
In this course, we’ll practice creating network traffic and inspecting the behavior of ICMP traffic. When you're finished, you'll have a fundamental understanding on how to find anomalies within ICMP.
Network Protocols for Security: IPv4 and ARP
Understanding how network protocols operate is an implied skill required to be successful in cyber security. In this course, we’ll practice creating network traffic and inspecting Link and Internet layer protocols.
Network Protocols for Security: SMB
In this course, you’ll practice creating network traffic and inspecting the behavior of the SMB protocol. When you’re finished, you’ll have a fundamental understanding on how to find anomalies within SMB.
Network Protocols for Security: TCP and UDP
This course will teach you to practice creating network traffic and inspecting transport protocols. When you’re finished, you’ll have a fundamental understanding on how to find anomalies within TCP and UDP.
Network Security Basics
This course will explain the basic concepts of network security including describing different types of network attacks, methods of detecting them, as well as mitigation techniques.