Showing 2113–2124 of 4482 results

Information Systems Operations: Monitoring
This course describes the knowledge that is essential for you as an information systems auditor. You will learn the components of information systems and the processes that support them, enabling you to provide meaningful evaluations of systems.

Information Systems Operations: Resilience
Auditors must understand the processes and methodologies of business resilience, and be able to assess the ability of the organization to manage incidents and recover from crisis. In this course, you will learn the ways to perform these audits.

Information Technology and Security ISACA® CRISC™
This course will teach you the principles of risk management in regard to information technology and security needed for the CRISC™ examination.

Infrastructure and Network Security Architecture Planning and Design
Understand the principles of designing secure infrastructures and networks to protect against threats.

Infrastructure Security
Learn strategies for securing IT infrastructure, including networks, servers, and applications.

Infrastructure Testing with Pester 3
Not testing your infrastructure can be catastrophic. Learn how to prevent disaster and properly test your PowerShell and infrastructure with Pester.

Infrastructure-as-Code Security: Why, What, and How
In this talk, you'll learn about common IaC risks and best practices for securing infrastructure at scale using policy-as-code in both in build-time and run-time.

Ingest and Transform Data by Using Power BI – DP-500
Power BI Reports are a great way for your data to tell a story, but everything starts with properly obtaining the data. This course will teach you how to ingest and transform external data with Power BI, as preparation for the DP-500 exam.

Initial Access with Aircrack-ng
Attacking wireless networks is one of the main tasks during a red team exercise. The Aircrack-ng suite is a framework for WiFi security assessments. In this course, we cover how to get initial access on wireless networks using the Aircrack-ng tool.

Initial Access with Gophish
Gophish is an open source phishing tool written in the Go programming language for use by businesses and penetration testers to test for phishing awareness in their organization. In this course, you will learn Initial Access using Gophish.

Initial Access with King Phisher
King Phisher is a feature-rich tool for coordinating and monitoring successful phishing campaigns to further red teaming objectives towards initial access. In this course, you will learn initial access using King Phisher.

Initial Access with Luckystrike
Malicious office documents are an effective way to gain an initial foothold into a network. In this course, you will learn how to use Luckystrike to create custom malicious office documents, manage multiple payloads, and utilize custom templates.