Cybersecurity
Showing 1237–1248 of 1317 results
Troubleshooting Security and Active Directory Issues with Sysinternals Tools
This course teaches you how the Windows security subsystem works and how you can manage and troubleshoot related issues with Sysinternals tools.
Troy Hunt
Learn about the Ubiquity security breach, how phone data should be protected and more.
Trust and Security with Google Cloud
As organizations move their data and applications to the cloud, they must address new security challenges. The Trust and Security with Google Cloud course explores the basics of cloud security, the value of Google Cloud's multilayered approach to infrastructure security, and how Google earns and maintains customer trust in the cloud. Part of the Cloud Digital Leader learning path, this course aims to help individuals grow in their role and build the future of their business.
TUGrazX: Introduction to Software Side Channels and Mitigations
Side channels exist in the real world, but they also exist in computers and can be exploited directly from software. This is a substantial computer security problem today, that we need to learn about to be able to stop attacks. In this course, you will learn and practice basic software-based side channels and understand the thought process to utilize a side channel. You will then learn how to mitigate or avoid side channels in software.
Tuning and Creating Correlation Searches in Splunk Enterprise Security
Learn to plan, design, develop, tune, and deploy correlation searches in Splunk Enterprise Security v6. Understand and manage ES-specific lookups as well as setting up the Asset and Identity framework for data enrichment and helping investigations.
Two Factor Authentication (2FA)
What is two factor authentication 2FA?, Types of authentication factors used in 2FA, Knowledge factors: Something the user knows, Possession factors: Something the user has, Passwordless 2FA and More
UC3Mx: Cyber Security Basics: A Hands-on Approach
Learn how to think like a hacker, but behave as a security expert.
Uncle Rats XXE Handbook
XXE Made Simple!
Understanding Enterprise Architecture
This course is a comprehensive introduction to enterprise architecture. It will arm you with a solid understanding of the fundamentals as well as provide a good exposure to contemporary thinking and practices in this subject area.
Unified Defense: Expanding Security Consciousness to Every Corner of Your Organization
In today's complex digital landscape, cybersecurity threats are a constant source of change. Toss in a dash of GenAI and organizations are seeing the security industry revolutionize right before their eyes, from defense capabilities to intensified threats. Now, a successful cybersecurity strategy must go beyond a one-size-fits-all approach. Ensuring robust security is no longer the sole responsibility of the IT department. The most resilient organizations understand that fostering a holistic security-focused mindset across every department, role, and individual is key. Join us, as we discuss the solutions to this industry-wide problem. Hear from representatives at Sage, as they are leading the way to successfully tailor security training to diverse audiences across their organization, what unique challenges they’ve faced and what’s next as they look to the future.
Unit Test Development with Generative AI
Discover how Generative AI like ChatGPT can be used to create Python unit tests. Understand the Security Test Pyramid and best practices for AI unit testing.
UPValenciaX: IT Fundamentals for Business Professionals: Cybersecurity and social implications
Working with Information Technology (IT) without the necessary background? Learn about cybersecurity, careers, and social implications of IT