Security
Showing 97–108 of 114 results
Security Event Triage: Revealing Attacker Methodology in Web Application Events
In this course on revealing web application attack methodology, you will explore the use of web application filters, app service logs, and web vulnerability scanners to reveal various advanced attacker techniques and detecting live web exploitations.
Security Event Triage: Statistical Baselining with SIEM Data Integration
Log parsing and analysis does not scale well to large data sets. This course will teach you how to perform data analysis and baselining on large data sets to efficiently identify and address threats.
Security Leadership through Effective Communication
If you are interested in learning the skills necessary to become a more effective communicator and security leader, then you will benefit from the skills and tactics learned in this course.
Security Management: A Case Study
Security management encompasses a number of verticals, dealing with the day to day, developing programs, maintaining compliance and managing risk. This course covers what's important when starting up a cyber-security initiative.
Security Principles for CC℠
This course will teach you security concepts of information protection and assurance needed for the Certified in Cybersecurity Exam.
Setting Up a Malware Analysis Lab
In this course, you’ll learn how to set up a malware analysis sandbox for discovering indicators of compromise specific to the variants of malware threatening your organization.
Splunk Enterprise Administration: Managing Users and Authentication
Splunk's role based access control implementation can be daunting to learn. In this course, you'll gain a thorough understanding of Splunk roles and master Splunk authentication methods including single sign-on and multi-factor authentication.
Splunk Enterprise Administration: Working with Configuration Files and Indexes
You will gain a thorough understanding of Splunk’s layered configuration files architecture. You will also master creating and managing Splunk indexes, which are the building blocks of Splunk.
Splunk Enterprise Security: Big Picture
Splunk has a security tool for SOC operations and incident detection. Learn how Splunk Enterprise Security can help transform your SOC into an efficient, more effective one through streamlined investigations, correlation searches, and intelligence.
The IT Ops Sessions: Zero Trust Technologies – Designing and Deploying Microsegmentation
In this IT Ops session, you’ll learn to design and deploy microsegmentation throughout your enterprise.
Threat Intelligence: The Big Picture
This course provides a solid baseline for cyber threat intelligence. You will learn how to leverage intelligence to understand adversary behavior and make use of indicators of compromise to detect and stop malware.
Threat Modeling Fundamentals
Threat modeling can help mitigate security risks in an application in a repeatable and efficient way. This course teaches you the fundamentals of threat modeling and what the different approaches and methodologies are.