Cybersecurity
Showing 1177–1188 of 1317 results
Spring Framework 5: Using Spring Security OAuth2 Login
Securing your application with OAuth2 can seem like a daunting task. This course will teach you how to leverage Spring Security with Spring Boot to quickly and securely add OAuth2 Login to your applications.
Spring Security 5: Authentication / Authorization – Building Effective Layers of Defense
Spring Security is one of the most popular frameworks for securing Java applications. In this course, you will learn what makes it so powerful by configuring it with Spring Boot and adding multi-factor Authentication and Authorization to pages
Start Hacking and Making Money Today at HackerOne
Hack Legally and Get Paid For Your Findings
State of DevOps Report Insights: Integrating Security into the Software Delivery Cycle
This talk will showcase some of the common patterns and practices that highly evolved DevOps shops have in place to enable tighter integration with security and will provide a practical roadmap for adopting and expanding DevOps success.
Staying Secure Everywhere
Cyber-attackers target the business technology we use every day and everywhere. This course will teach you how to be cybersecure and avoid common security problems.
Streamlining Your Incident Response Process with Splunk
In this course, you’ll learn how Splunk can help streamline your incident response (IR) process.
Stuffing Your Cloud into Your SOCs
In this 5-minute session, Brendan O'Connor will talk about stuffing your cloud into SOCs.
Supply Chain Risk Management with OWASP Dependency-Check
Software supply chain risks are a huge security concern today and automated tools are essential to mitigate this threat. In this course, you will learn how to manage this risk by setting up OWASP Dependency-Check scanning on a software project.
Systems Security
Gain insights into systems security practices for protecting critical infrastructure and information systems.
Talk DevSecOps to Me
This talk digs into the fundamentals of DevSecOps, exploring the key principles required to advance your security practices.
Talking Tradecraft @ Pluralsight: A Technical Dive into the Log4Shell Exploit
This course is a technical post-mortem of the Log4Shell vulnerability, discussing the impact that has been seen to date, new developments in the remediation, and what to expect in the future.
Tech Ethics: Executive Briefing
You may have heard of technology ethics, now is your chance to practice it. This course will teach you practical methods of ensuring that tech ethics makes its way into your products and cultures.