Cybersecurity
Showing 1165–1176 of 1317 results
Specialized Testing: XSS
Since the late 1990s, cross-site scripting (XSS) has been one of the most common security issues in web applications. This course will teach you how to test a site for this kind of vulnerability.
Splunk 9: Configuring and Administering Splunk Indexer Clusters
This course will teach you how to configure and administer all the components of a Splunk Indexer Cluster. After completing this course you will be able to set up and manage a complete Splunk indexer cluster.
Splunk 9: Correlating Events with Transactions
This course will teach you to use Splunk Enterprise to group and correlate log events from disparate sources.
Splunk 9: Creating Workflow Actions
Have you been wanting to use your data better within Splunk? This course will give you the knowledge and tools to help you learn more about this SIEM, the workflow actions possible within it, and how to use them to add more context to your data.
Splunk 9: Employing the Splunk Common Information Model (CIM)
Splunk is the most popular data analytics platform for security and observability. This course will teach you how to use Splunk’s powerful Common Information Model to normalize data and to build and optimize reports and dashboards.
Splunk 9: Installation and Configuration
Splunk is known as the easy button for machine generated data. This course will teach you Splunk fundamentals of installing and configuring Splunk enterprise.
Splunk 9: Introduction to Splunk for Security Detection and Monitoring
This course will teach you how to introduce security with the Splunk product set.
Splunk 9: Optimizing Fields, Tags, and Event Types
Splunk knowledge is the cornerstone of its operations. This course will give you the knowledge and tools to help you learn more about this SIEM, the knowledge within it, and how to manipulate it to create efficiencies.
Splunk Enterprise Administration: Managing Users and Authentication
Splunk's role based access control implementation can be daunting to learn. In this course, you'll gain a thorough understanding of Splunk roles and master Splunk authentication methods including single sign-on and multi-factor authentication.
Splunk Enterprise Administration: Working with Configuration Files and Indexes
You will gain a thorough understanding of Splunk’s layered configuration files architecture. You will also master creating and managing Splunk indexes, which are the building blocks of Splunk.
Splunk Enterprise Security: Big Picture
Splunk has a security tool for SOC operations and incident detection. Learn how Splunk Enterprise Security can help transform your SOC into an efficient, more effective one through streamlined investigations, correlation searches, and intelligence.
Spring Framework 5: Securing Spring Applications against Common Security Threats
Spring Security is one of the most popular frameworks for securing Java applications. This course will teach you how to add and configure Spring Security to your applications to protect your users against some common security threats.