Cybersecurity
Showing 1069–1080 of 1211 results
Specialized Hunts: Threat Hunting within Virtual Machines
VMs are part of the environment in which an adversary can operate. This course will teach you how to set up and perform a specialized threat hunt within VMs.
Specialized Testing: XSS
Since the late 1990s, cross-site scripting (XSS) has been one of the most common security issues in web applications. This course will teach you how to test a site for this kind of vulnerability.
Splunk 9: Configuring and Administering Splunk Indexer Clusters
This course will teach you how to configure and administer all the components of a Splunk Indexer Cluster. After completing this course you will be able to set up and manage a complete Splunk indexer cluster.
Splunk 9: Correlating Events with Transactions
This course will teach you to use Splunk Enterprise to group and correlate log events from disparate sources.
Splunk 9: Creating Workflow Actions
Have you been wanting to use your data better within Splunk? This course will give you the knowledge and tools to help you learn more about this SIEM, the workflow actions possible within it, and how to use them to add more context to your data.
Splunk 9: Employing the Splunk Common Information Model (CIM)
Splunk is the most popular data analytics platform for security and observability. This course will teach you how to use Splunk’s powerful Common Information Model to normalize data and to build and optimize reports and dashboards.
Splunk 9: Installation and Configuration
Splunk is known as the easy button for machine generated data. This course will teach you Splunk fundamentals of installing and configuring Splunk enterprise.
Splunk 9: Introduction to Splunk for Security Detection and Monitoring
This course will teach you how to introduce security with the Splunk product set.
Splunk 9: Optimizing Fields, Tags, and Event Types
Splunk knowledge is the cornerstone of its operations. This course will give you the knowledge and tools to help you learn more about this SIEM, the knowledge within it, and how to manipulate it to create efficiencies.
Spring Framework 5: Securing Spring Applications against Common Security Threats
Spring Security is one of the most popular frameworks for securing Java applications. This course will teach you how to add and configure Spring Security to your applications to protect your users against some common security threats.
Spring Framework 5: Using Spring Security OAuth2 Login
Securing your application with OAuth2 can seem like a daunting task. This course will teach you how to leverage Spring Security with Spring Boot to quickly and securely add OAuth2 Login to your applications.
Spring Security 5: Authentication / Authorization – Building Effective Layers of Defense
Spring Security is one of the most popular frameworks for securing Java applications. In this course, you will learn what makes it so powerful by configuring it with Spring Boot and adding multi-factor Authentication and Authorization to pages