Showing 3553–3564 of 4482 results

Security Event Triage: Detecting Malicious Traffic with Signature and Session Analysis
Cyber attacks can take different forms and be performed by threat groups with different goals and methods. In this course, you will learn how signature and session analysis can be used to detect those attacks with network data.

Security Event Triage: Leveraging Existing Security Device Alerts
Identifying suspicious network activity can prevent serious security breaches. By monitoring centralized device logs you can catch potential security problems in a timely manner.

Security Event Triage: Monitoring Assets and Topology
Protecting your network is now more important than ever. You can accomplish this by comparing what you know should be on the network to current network and vulnerability scans in order to identify abnormal network devices and traffic.

Security Event Triage: Statistical Baselining with SIEM Data Integration
Log parsing and analysis does not scale well to large data sets. This course will teach you how to perform data analysis and baselining on large data sets to efficiently identify and address threats.

Security for Hackers and Developers: Code Auditing
Did you know that bugs in software costs the economy billions of dollars a year? In this course, you are going to help turn the tide as you learn how to find and fix critical bugs quicker.

Security for Hackers and Developers: Exploit Development
Developers are busy, but understanding how to exploit software will help you properly prioritize security critical bugs. This course will teach you basic exploits, shellcoding, and return-oriented programming (ROP).

Security for Hackers and Developers: Fuzzing
Fuzzing is a critical part of the security development lifecycle. This particular technique is used by hackers to find bugs. In this course, software makers will learn how to fuzz - before the bad guys do.

Security for Hackers and Developers: Reverse Engineering
In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.

Security Governance: FISMA
This course will teach you about the Federal Information Security Management Act that protects the agencies of the federal government.

Security Hot Takes: CrowdStrike Outage Post-mortem
So, CrowdStrike blew up the internet! But what really happened and why was the impact so big? We’ll take you through the what, how and why of the CrowdStrike outage and cover some lessons we can all learn from the event.

Security Monitoring for Cisco CyberOps Associate
Telemetry and security monitoring expand the visibility and usage of security tools. This course will detail many aspects of cyber attacks, security monitoring and data visibility, and evasion techniques.

Security Operations and Administration for SSCP®
This course will teach you the concepts of access controls and identity management. It is a core subject addressed in the SSCP examination and requires comprehension and applicability of access control concepts and implementation.