Showing 15649–15660 of 18767 results
Security Event Triage: Monitoring Assets and Topology
Protecting your network is now more important than ever. You can accomplish this by comparing what you know should be on the network to current network and vulnerability scans in order to identify abnormal network devices and traffic.
Security Event Triage: Monitoring Network Application Services
Exploited network application services allow a malicious actor to establish covert channels and silently exfiltrate data. This course will show you how to use the service logs to quickly detect these attacks and closedown the open threat vectors.
Security Event Triage: Operationalizing Security Analysis
In this course you begin the security event triage path, entering the world of modern security operations and learning the technologies and skills required by security analysts to be as advanced as the threats they face.
Security Event Triage: Revealing Attacker Methodology in Web Application Events
In this course on revealing web application attack methodology, you will explore the use of web application filters, app service logs, and web vulnerability scanners to reveal various advanced attacker techniques and detecting live web exploitations.
Security Event Triage: Statistical Baselining with SIEM Data Integration
Log parsing and analysis does not scale well to large data sets. This course will teach you how to perform data analysis and baselining on large data sets to efficiently identify and address threats.
Security for Hackers and Developers: Code Auditing
Did you know that bugs in software costs the economy billions of dollars a year? In this course, you are going to help turn the tide as you learn how to find and fix critical bugs quicker.
Security for Hackers and Developers: Exploit Development
Developers are busy, but understanding how to exploit software will help you properly prioritize security critical bugs. This course will teach you basic exploits, shellcoding, and return-oriented programming (ROP).
Security for Hackers and Developers: Fuzzing
Fuzzing is a critical part of the security development lifecycle. This particular technique is used by hackers to find bugs. In this course, software makers will learn how to fuzz - before the bad guys do.
Security for Hackers and Developers: Overview
Enterprises around the world are concerned about cyber security. This course will teach you the fundamentals of information security applicable in any software development discipline.
Security for Hackers and Developers: Reverse Engineering
In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.
Security Framework: NIST CSF
This course will teach you about the NIST CSF 2.0. The controls at the core provide a set of best practices, and the tiers allow you to set the level you intend to implement the controls.
Security Framework: NIST RMF
In this course, you'll learn the foundations of how the NIST Risk Management Framework can help you protect data, in a balance of security, functionality, compliance, and competing resources.