Cybersecurity
Showing 565–576 of 1317 results
Implementing Service Provider Security and Application Control
When network engineers think of cyber security, they often think of firewalls, intrusion prevention systems, and host-based security systems. Alternatively, service provider security introduces an entirely new set of tools and operating processes.
Implementing Threat Detection Solutions in Windows Server 2016
This course is designed for seasoned Windows administrators who have a desire to learn about the threats facing Windows Administrator’s data and network.
Implementing User Access and Authentication with Amazon Cognito
This course will teach you how to use Amazon Cognito to manage access to your applications and AWS services with easy integration to third-party identity providers and provide your users with cutting edge security which is all managed by AWS.
Important DevSecOps Tools
Learn DevSecOps essentials: SAST and DAST tools like Bandit, Clean Code, LGTM, OWASP ZAP, and Nikto, plus dependency analysis and IaC security tools. Explore secrets and vulnerability management.
Incident Detection and Investigation with QRadar 7
In this course, you will explore the IBM Security QRadar SIEM tool from an SOC analyst perspective. This course is aligned to the "IBM QRadar SIEM V7.3.2 Fundamental Analysis" exam objectives (Exam C1000-018) with coverage of additional topics.
Incident Detection and Investigation with QRadar Apps
This course will teach you about the main QRadar apps and how you can improve your incident investigation with them. You learn not only the technical aspect of each app, but also the investigation step-by-step of the main incident types using apps.
Incident Forensics: Digital Media Acquisition
The first step on a forensic investigation is to acquire the data related to the incident. In this course, you will learn how to acquire data from devices (such as laptops, hard drives and USB sticks) following a proper forensic methodology.
Incident Investigation with IBM Security QRadar
The incident response team is responsible for investigating offenses, determining the impact of incidents, and creating eradication/remediation plans. This course will teach you how to respond to cyber incidents using the IBM Security QRadar SIEM.
Incident Management for CISM®
This course will teach you the skills of incident management and investigation needed for the CISM - Certified Information Security Manager exam.
Incident Management with TheHive
TheHive is a platform that allows security incidents to be created and tracked in an efficient and streamlined manner. In this course, you will learn how to record, manage, and mitigate incidents using TheHive.
Incident Response & Threat Hunting Using Bro/Zeek Data
BSides Huntsville | Incident Response & Threat Hunting Using Bro/Zeek Data | Alex Kirk
Incident Response and Business Continuity Architecture Planning, Design and Implementation
Learn to develop and implement effective incident response and business continuity plans for organizations.