Cybersecurity
Showing 901–912 of 1317 results
Persistence with pwncat
During a red team engagement, it is crucial that you maintain foothold on your compromised servers. In this course, you will learn persistence using pwncat.
Phishing and Email Security Best Practices
Attackers want to trick you into helping them by sending you malicious emails, text messages and even voice calls. This course will teach you how to spot phishing attacks and what to do afterwards.
Phishing and Protecting Against Phishing Scams
What is phishing?, Types of phishing attacks, Protecting against phishing scams, Security technologies that fight phishing, and Security information and event management (SIEM)
Physical Security
Most information security professionals find the domain of physical security to be one of their hardest areas. This course outlines the concepts of physical security and will help you understand physical security requirements and implementation.
Planning and Scoping for CompTIA Pentest+
Your first task in a penetration test project is to define the scope and plan your engagement. This Pentest+ course teaches you how to identify testing requirements, assets in scope, legal boundaries, limitations, rules of engagement, and much more.
Planning, Deploying, and Configuring Splunk Enterprise Security
Splunk Enterprise Security is a premium application used within the Splunk deployment to help with SOC operations. This course will teach you how to plan for, design, and deploy the application to use in your environment.
Play by Play: Modern Web Security Patterns
In this course, you’ll learn how to implement and manage all the aspects of web security to be on the more secure end of the spectrum.
Pluralsight LIVE 2018: Get Your Geek On (Security)
Safeguard your organization from threats by leveling up your security know-how.
Pluralsight LIVE 2019: Breakouts (Security)
Safeguard your organization from threats by leveling up your security know-how.
Post Exploitation with Kali Linux
Kali Linux is a flavor of Linux that comes pre-loaded with many security tools for all levels of the attack kill chain. This course will teach you about post exploitation techniques using Kali Linux.
Post Exploitation with Meterpreter
In a penetration test, escalating your privileges and exfiltrating data are some of the most important tasks of the assessment. This course will teach you how to use the Meterpreter tool for post-exploitation tasks.
Post Exploitation with PowerShell
After gaining access to a server in a red team engagement, your next step is to escalate your privileges and establish persistence. This course will teach you post-exploitation techniques with PowerShell.