Security
Showing 37–48 of 114 results
Getting Started with Memory Forensics Using Volatility
With the increasing sophistication of malware, adversaries, and insider threats, memory forensics is a critical skill that forensic examiners and incident responders should have the ability to perform.
Getting Started with OAuth 2.0
OAuth 2.0 is the go-to solution for API security, bringing authorization and delegation to modern HTTP APIs. In this course, you'll learn the fundamentals of OAuth, allowing you to architect and implement the right solution for your requirements.
Getting Started with Reverse Engineering
Reverse engineering binary code is a core skill for software security engineers, malware analysts and penetration testers. This course will teach you techniques for reversing binary code to identify program characteristics and behavior.
Identifying Security Requirements of an AI Solution
In this course, you will walk through the services used to create an AI solution in Azure and the requirements to secure the solution, including data security and deployment security of Machine Learning models and Cognitive Services.
Implementing Host Security in Microsoft Azure
This course identifies the resources, tools, and methods needed to secure hosts in Azure as well as hosts connecting to Azure.
Incident Forensics: Digital Media Acquisition
The first step on a forensic investigation is to acquire the data related to the incident. In this course, you will learn how to acquire data from devices (such as laptops, hard drives and USB sticks) following a proper forensic methodology.
Initial Access with Aircrack-ng
Attacking wireless networks is one of the main tasks during a red team exercise. The Aircrack-ng suite is a framework for WiFi security assessments. In this course, we cover how to get initial access on wireless networks using the Aircrack-ng tool.
Initial Access with WiFi-Pumpkin
During a red team exercise, getting access to the internal network is one of your first tasks. In this course, we cover the WiFi-Pumpkin tool, which allows you to create rogue access points with fake captive portals.
Inspecting Open Source Software Packages for Security and License Compliance
This course will teach you about the inherent risks with leveraging open source libraries and components in your solutions, and how you can mitigate those risks using a software composition analysis tool, called WhiteSource Bolt, to scan your code.
Introduction to AWS Cloud Security
Amazon Web Services is a leading cloud provider offering scalable cloud solutions worldwide. This course will teach you the basics of creating a secure cloud environment within AWS that can increase your data protection and application revenue.
Introduction to Browser Security Headers
Browser security headers provide a means for websites to describe how they should behave when loaded into the client. By specifying expected and allowable behaviors, security headers can thwart a number of otherwise serious attacks against websites.
IoT Device Security: Executive Briefing
This course is an overview of threats and defensive measures against cyber attacks on smart devices or "Internet of Things".