Security
Showing 25–36 of 114 results
Defeating Anti-reverse Engineering and Anti-debugging Techniques
Anti-reverse engineering and anti-debugging techniques are often used by malware authors to disrupt or prevent analysis, helping them to avoid detection. This course will teach you effective strategies for detecting and defeating these techniques.
Defeating Injection Attacks in ASP.NET and ASP.NET Core
Web applications are at constant risk of attack, and one of the most common attacks is the dreaded injection attack. This course will show you how to defeat three common injection attacks, including SQL Injection, in ASP.NET and ASP.NET Core.
Defense Evasion with Invoke-Obfuscation
Staying undetected is essential in a red team engagement. In this course, you will learn how to obfuscate malicious scripts to bypass anti-virus solutions using the Invoke-Obfuscation tool.
Developing and Implementing Vulnerability Management Programs
This course is for Security Managers & CISOs to create, run, and manage their VM program effectively. This course deals with handling vulnerability management, compliance management, risk management, and VAPT in a single integrate framework.
Developing Daemons and Services Protected by Azure Active Directory
Daemons or Services are a big part of any application. This course will teach you how you can securely access Azure AD protected APIs from your services and daemons.
Discovery with BloodHound
Attacking Active Directory is a great way to achieve control of an environment, letting you access the data, and act on your objectives. BloodHound lets you visualize the shortest path to get to where you need to be.
Evaluating Your Organization’s Security Posture
This course will teach you about completing a holistic security evaluation, and how to shape it into a repeatable practice that helps raise the IT security posture for the whole company.
Field Guide to Binary
Binary and all alternate numbering systems work in the same ways as the decimal system. In this course, you'll explore binary and hexadecimal, and transition through alternate numbering systems to strip away the magic.
Fundamentals of Encryption & Quantum-Safe Techniques
Understand the fundamentals of encryption and quantum-safe techniques. Learn how to secure data using encryption, and explore emerging quantum technologies to ensure your security protocols are future-proof in the evolving landscape of cybersecurity.
Getting Started Analyzing Malware Infections
Malware infections are growing at an alarming rate. This course will teach you how to safely analyze malicious links, infected documents, and malicious archives with the focus on gathering indicators of compromise.
Getting Started with Azure Active Directory for Developers
Azure Active Directory is central to Microsoft Azure and the Microsoft Identity Platform. This course will teach you the basics of Azure AD, creating it, managing it, apps, service principals, and a high familiarization with modern identity concepts.
Getting Started with Keycloak
Adding SSO-friendly authentication and authorization to your applications using Keycloak doesn't have to be hard. Learn how to do a better job securing your apps by controlling access without spending weeks figuring it all out.