Security
Showing 85–96 of 114 results
Securing Java Web Applications Through Authentication
Your users' usernames and passwords are the keys to the kingdom. Watch and apply this course in order to approach authenticating and managing secure data in Java web applications with greater confidence.
Securing Microsoft Azure Subscriptions
In this course, you will learn how to protect and provide least-privilege security for your Azure AD tenant and Azure subscription resources.
Securing Network Communication with Cisco VPNs
Once an organization has selected the right VPN for their needs, someone will need to add the VPN configuration to the router and this is where you come in, however, it's also important to know how it's done and this is where this course comes in.
Securing Spring Data REST APIs
If you got a text from an unlisted number asking for your credit card, would you give it out? Actually, we do this with customer data all the time in our REST APIs. Learn how Spring Security simplifies OAuth 2.0 and helps close these security gaps.
Securing the Switch
This course will describe some of the most severe switch security risks and discuss the mechanisms to help mitigate attacks through the well-known vectors.
Security Engineering: Secure Endpoints
Endpoint security is an important consideration when evaluating the overall security of your systems. This course will teach you how to harden and monitor Windows, Linux, and container endpoints.
Security Event Triage: Detecting Malicious Traffic with Signature and Session Analysis
Cyber attacks can take different forms and be performed by threat groups with different goals and methods. In this course, you will learn how signature and session analysis can be used to detect those attacks with network data.
Security Event Triage: Detecting Network Anomalies with Behavioral Analysis
In this course on network behavioral analysis, you will explore the use of frequency, protocol, and population analysis methodologies to uncover events associated with multiple threat actors intrusions into a simulated enterprise network.
Security Event Triage: Detecting System Anomalies
In this course on system anomaly detection, you will explore the use of CPU, RAM, GPU, fans, and power resource usage data to reveal various advanced attacker techniques and uncover events associated with hardware supply chain interdiction.
Security Event Triage: Leveraging Existing Security Device Alerts
Identifying suspicious network activity can prevent serious security breaches. By monitoring centralized device logs you can catch potential security problems in a timely manner.
Security Event Triage: Monitoring Assets and Topology
Protecting your network is now more important than ever. You can accomplish this by comparing what you know should be on the network to current network and vulnerability scans in order to identify abnormal network devices and traffic.
Security Event Triage: Operationalizing Security Analysis
In this course you begin the security event triage path, entering the world of modern security operations and learning the technologies and skills required by security analysts to be as advanced as the threats they face.