Cybersecurity
Showing 469–480 of 1317 results
Getting Started with Memory Forensics Using Volatility
With the increasing sophistication of malware, adversaries, and insider threats, memory forensics is a critical skill that forensic examiners and incident responders should have the ability to perform.
Getting started with Metasploit
A guide to getting you started with Metasploit
Getting Started with Nmap 7
Testing network security controls and discovering vulnerabilities are important parts of any organization's security plan. This course will help you learn how to use Nmap to discover network hosts and potential vulnerabilities.
Getting Started with OAuth 2.0
OAuth 2.0 is the go-to solution for API security, bringing authorization and delegation to modern HTTP APIs. In this course, you'll learn the fundamentals of OAuth, allowing you to architect and implement the right solution for your requirements.
Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing
The OWASP Zed Attack Proxy is an open source way of testing your web applications manually. This course walks through the basic functions of ZAP, giving you a look at ways this tool makes taking advantage of web application vulnerabilities possible.
Getting Started with Reverse Engineering
Reverse engineering binary code is a core skill for software security engineers, malware analysts and penetration testers. This course will teach you techniques for reversing binary code to identify program characteristics and behavior.
Getting Started with SAML 2.0
SAML is one of the most established SSO protocols, found in many organizations. This course will teach you how SSO using SAML works, how the various request and response messages fit together, and what to look for in a modern SAML implementation.
Getting Started with Snort 3
In Getting Started with Snort, you will go from never before having operated Snort, to comfortably starting it from the command line and expanding its functionality through additional plugins.
Getting Started with Wireshark
In this course, you'll learn about capture filters, the nuances between TAPs and SPAN captures, and delve into the Wireshark interface. Explore basic protocol analysis with ARP and ICMP, and kickstart your TCP analysis journey.
Getting Started with Zeek
Zeek is a great open-source tool that allows you to monitor your network and analyze events within it. This course will teach you about this tool, and how to configure and use it within your network to suit your needs.
Ghidra Concepts and Basic Functionality
At the core of every reverse engineers toolkit is a tool that disassembles or decompiles machine code. This course will teach you everything you need to know to get started with Ghidra, a free and open source suite of reverse engineering tools.
Google Security Operations – Deep Dive
Take the next steps in working with the Chronicle Security Operations Platform. Build on fundamental knowledge to go deeper on customization and tuning.