Cybersecurity
Showing 301–312 of 1317 results
Dealing with Credentials When Securing an ASP.NET Core 3 Application
In this course you'll learn best practices regarding user and password management, integrating with third-party providers like Facebook, setting up federation and implementing multi-factor authentication.
Defeating Anti-reverse Engineering and Anti-debugging Techniques
Anti-reverse engineering and anti-debugging techniques are often used by malware authors to disrupt or prevent analysis, helping them to avoid detection. This course will teach you effective strategies for detecting and defeating these techniques.
Defeating Injection Attacks in ASP.NET and ASP.NET Core
Web applications are at constant risk of attack, and one of the most common attacks is the dreaded injection attack. This course will show you how to defeat three common injection attacks, including SQL Injection, in ASP.NET and ASP.NET Core.
Defending Against AI-Generated Attacks
Dive into the dangerous world of AI phishing and learn how to protect yourself from attacks and misinformation.
Defending Against JavaScript Keylogger Attacks on Payment Card Information
In this course, you’ll learn how about the most common attack now used to steal payment card data and the possible defences.
Defending and Securing Systems
Study techniques for defending systems against cyber threats and securing information assets.
Defending Node Applications from SQL Injection, XSS, & CSRF Attacks
Learn how to protect Node.js Applications from SQL Injection, CSRF, & XSS Attacks, JavaScript safety practices, and what to do when something goes wrong.
Defense Evasion with Invoke-Obfuscation
Staying undetected is essential in a red team engagement. In this course, you will learn how to obfuscate malicious scripts to bypass anti-virus solutions using the Invoke-Obfuscation tool.
Defense Evasion with Meterpreter
Learning Defense Evasion is a prerequisite for using Metasploit tooling successfully in a secure environment. This course will teach you how to stay under the radar and evade detection even in highly secure environments.
Defense Evasion with ProxyChains
Network security tools are the most common line of defense in a company. In this course, you will learn how to use ProxyChains to re-route your network traffic and bypass such security tools.
Defense Evasion with Veil
In this course, Red Teamers will learn how to utilize the Veil to easily create unique payloads which will execute your preferred payload. T1027 on the specified target system T1480.001.
DelftX: Cyber Security Economics
Learn how to make better decisions about security and IT by using state-of-the-art economic tools, security metrics and data analytics.