Cybersecurity
Showing 1093–1104 of 1317 results
Security Event Triage: Analyzing Live System Process and Files
Traditional forensic analysis on endpoints is outpaced by modern attack techniques. This course will teach you how to efficiently identify and investigate malicious activity by performing live system analysis on processes and files.
Security Event Triage: Detecting Malicious Traffic with Signature and Session Analysis
Cyber attacks can take different forms and be performed by threat groups with different goals and methods. In this course, you will learn how signature and session analysis can be used to detect those attacks with network data.
Security Event Triage: Detecting Network Anomalies with Behavioral Analysis
In this course on network behavioral analysis, you will explore the use of frequency, protocol, and population analysis methodologies to uncover events associated with multiple threat actors intrusions into a simulated enterprise network.
Security Event Triage: Detecting System Anomalies
In this course on system anomaly detection, you will explore the use of CPU, RAM, GPU, fans, and power resource usage data to reveal various advanced attacker techniques and uncover events associated with hardware supply chain interdiction.
Security Event Triage: Leveraging Existing Security Device Alerts
Identifying suspicious network activity can prevent serious security breaches. By monitoring centralized device logs you can catch potential security problems in a timely manner.
Security Event Triage: Monitoring Assets and Topology
Protecting your network is now more important than ever. You can accomplish this by comparing what you know should be on the network to current network and vulnerability scans in order to identify abnormal network devices and traffic.
Security Event Triage: Monitoring Network Application Services
Exploited network application services allow a malicious actor to establish covert channels and silently exfiltrate data. This course will show you how to use the service logs to quickly detect these attacks and closedown the open threat vectors.
Security Event Triage: Operationalizing Security Analysis
In this course you begin the security event triage path, entering the world of modern security operations and learning the technologies and skills required by security analysts to be as advanced as the threats they face.
Security Event Triage: Revealing Attacker Methodology in Web Application Events
In this course on revealing web application attack methodology, you will explore the use of web application filters, app service logs, and web vulnerability scanners to reveal various advanced attacker techniques and detecting live web exploitations.
Security Event Triage: Statistical Baselining with SIEM Data Integration
Log parsing and analysis does not scale well to large data sets. This course will teach you how to perform data analysis and baselining on large data sets to efficiently identify and address threats.
Security for Hackers and Developers: Code Auditing
Did you know that bugs in software costs the economy billions of dollars a year? In this course, you are going to help turn the tide as you learn how to find and fix critical bugs quicker.
Security for Hackers and Developers: Exploit Development
Developers are busy, but understanding how to exploit software will help you properly prioritize security critical bugs. This course will teach you basic exploits, shellcoding, and return-oriented programming (ROP).