Security
Showing 13–24 of 114 results
Cisco CyberOps: Exploring Security Concepts
Cybersecurity concepts are fundamental pieces of knowledge necessary to have a career in the industry. This course will explore security concepts to ensure that a solid foundation is laid for future knowledge.
Cisco Enterprise Networks: Infrastructure Security
In this course, you'll learn how to configure DHCP snooping, IP source guard, dynamic ARP inspection (DAI), port security, storm control, RADIUS, and TACACS+.
Collection with PowerSploit
In this course, we'll explore the language of logic and deductive reasoning. Completing this course will grant you the knowledge needed to make better decisions.
Conducting Network Vulnerability Analysis
This course will teach you how to find vulnerabilities in systems and software by teaching the process that a hacker uses when they target an organization.
Configuring Encryption for Data at Rest in Microsoft Azure
In this course, you will learn how to apply additional encryption protection for data at rest on Azure resources, including Azure storage, Azure Disk Encryption, Recovery Vaults, Transparent Data Encryption, and Always Encrypted databases.
Configuring Microsoft Azure Active Directory Privileged Identity Management
In this course, Configuring Microsoft Azure Active Directory Privileged Identity Management, you learn how to apply and monitor least-privilege security for Azure Active Directory and your Azure subscriptions.
Creating Security Baselines in Microsoft Azure
This course will teach you about Security Baselines, which are part of the Microsoft Cloud Adoption Framework for Azure. You'll learn how to identify security risks, create policy statements to address them, and implement secure designs in Azure.
Credential Access with Hashcat
Hashcat is the number one offline password cracker used by red team members and penetration testers. If you want to learn how to use Hashcat to crack passwords with different password cracking techniques, then this course is for you.
Credential Access with John the Ripper
John the Ripper (JtR) is widely used within red team assessments. Learn how to leverage the powerful capabilities of JtR to crack passwords of various hash types and use JtR within Metasploit.
Cryptography Fundamentals for Developers and Security Professionals
Cryptography ensures confidentiality and authenticity of digital documents. The mathematics behind cryptography show us why, and how far, it can be trusted.
Cyber Security: Executive Briefing
Every organization needs to protect itself from cyber threats. This course covers the essentials of cyber security, you will learn about threats, vulnerabilities and the protective, defensive and corrective controls deployed by organizations.
Dealing with Credentials When Securing an ASP.NET Core 3 Application
In this course you'll learn best practices regarding user and password management, integrating with third-party providers like Facebook, setting up federation and implementing multi-factor authentication.