Cybersecurity
Showing 229–240 of 1317 results
Continuous Monitoring for CGRC
How do you ensure that an information system remains secure throughout its operational life cycle? This course will teach you the skills of continuous monitoring needed for the Certified in Governance, Risk, and Compliance examination.
Convergence of Chaos Engineering and Revolutionized Technology Techniques
In this talk, we are to explore how these emerging paradigms can use Chaos Engineering to manage the pains in the path toward providing a solution.
Creating a Security-centric Culture
In this thought leadership course, you will delve into some fundamental techniques that can be employed to make security the norm rather than the exception.
Creating Security Baselines in Microsoft Azure
This course will teach you about Security Baselines, which are part of the Microsoft Cloud Adoption Framework for Azure. You'll learn how to identify security risks, create policy statements to address them, and implement secure designs in Azure.
Credential Access with Cain & Abel
From manipulating network traffic to cracking user credentials, this course will give you the skills and understanding to further your red teaming objectives towards exploitation, credential access, and lateral movement.
Credential Access with Hashcat
Hashcat is the number one offline password cracker used by red team members and penetration testers. If you want to learn how to use Hashcat to crack passwords with different password cracking techniques, then this course is for you.
Credential Access with John the Ripper
John the Ripper (JtR) is widely used within red team assessments. Learn how to leverage the powerful capabilities of JtR to crack passwords of various hash types and use JtR within Metasploit.
Credential Access with LaZagne
In this course, you will learn privilege escalation using LaZagne, a post-exploitation tool used to recover credentials from a system.
Credential Access with Mimikatz 2
In addition to other functionality, Mimikatz extracts password hashes and clear-text credentials from system memory. Mimikatz can also manipulate domain account passwords or display protected credentials stored in files.
Credential Access with Responder
After getting initial access in a network, your next task is to move laterally and escalate privileges. In this course, you will see the Responder tool which allows you to exploit vulnerabilities on the LLMNR and NBT-NS protocols to get credentials
Credential Access with THC Hydra
THC Hydra is a fast and powerful parallelized network login cracker with support for a wide variety of network protocols. Skill up your brute forcing techniques by leveraging THC Hydra to identify weak passwords.
Credential Management and Access Control with Active Directory and Entra ID
Modern authentication uses a variety of factors and technologies to verify the identity of a user. This course will teach you how to implement passwordless authentication options, on-premises and in the cloud.