Commonly used penetration tools4 H 58 M
In this course, learn about the common tools used for pen testing. Bonus! Learn how to make your own pen testing tools with Mike and Daniel.
In this episode, Daniel and Mike explore common tools, techniques, and practices used in the pursuit of securing...
Security features found in modern Linux distributions10 H 47 M
This course covers various Linux security techniques like data encryption, firewall configuration, auditing access, pen testing tools, and more.
The Linux Security Techniques series introduces the viewers to the various security...
In this course, learn about the common tools used for pen testing. Bonus! Learn how to make your own pen testing tools with Mike and Daniel.
In this episode, Daniel and Mike explore common tools, techniques, and practices used in the pursuit of securing your environment. Here they specifically...
In this episode, Daniel and Don examine the characteristics that make up a high quality password. They identify weaknesses found in many passwords and demonstrate how attackers can take advantage of weak passwords. They then help the viewers by suggesting a few methods to easily create...
his course is for everyone who wishes to understand the basic and the common cyber security threats that IT pros face daily and how they handle them.
Practical IT Security
Multi-Factor Authentication
Multi-Factor Authentication Part 2
Multi-Factor Authentication Part 3
Multi-Factor...
What you’ll learn
An advanced practical skill-set in securing laptops, desktops and mobile devices.
Start a career in cyber security. Become a cyber security specialist.
The very latest up-to-date information and methods.
You will master the selection and implementation of solid disk...
Learn about security within Amazon Web Services and pass this specialty exam.
The top issue in the IT industry right now is finding enough trained talent to run an effective IT team. The second issue is security. Amazon Web Services are addressing both of these needs by launching the AWS...
The ICS/SCADA Security Analyst skill path provides you with the knowledge needed to defend the systems that control critical infrastructure. You’ll learn about assessing the security of industrial control and SCADA systems and protecting them from cyber threats.
This learning path goes...
Python is a great language for learning, writing web applications, and manipulating data. However, Python can be used for security testing as well. In this series, we will explore the use of Python in such concepts as brute force password cracking, making SSH connections programmatically...
Ready to increase your IT security savvy? Keith Barker’s Cisco CCNP Security 300-207 SITCS training course has been released! You’ll learn the ins and outs of various Cisco threat control technologies during the 25-video course. We caught up with Keith to get his thoughts on the training, and...
In this advanced Cisco Security training, Keith Barker prepares learners to take three of the four required exams to earn the CCNP Security certifications: the 300-208 SISAS, 300-206 SENSS, 300-209 SIMOS.
In addition to that, this course covers the 300-207 SITCS exam, which – despite being...
12 courses // 54 videos // 8 hours of training
Information Security Fundamentals training
This learning path builds on your existing IT knowledge and introduces you to fundamental information security concepts and areas. You’ll gain confidence in your cybersecurity skills as you progress...
Cloud Security Architecture training
This learning path provides an in-depth look at cloud security architecture. As you progress through 17 courses, you’ll build your knowledge and skills around cloud infrastructure and design, cloud data and application security, network security, secure...
CompTIA Advanced Security Practitioner (CASP+) training
This learning path prepares you to pass the CompTIA Advanced Security Practitioner (CASP+) exam. As you progress through 16 courses tied to the five CASP+ domains, you’ll learn advanced practitioner skills, such as analyzing the security...
Trainer Keith Barker is back with another in-depth course on Cisco security, “Cisco CCNP Security 300-209 SIMOS.” If you’ve been wanting to learn more about implementing Cisco Secure Mobility Solutions and ultimately earn your CCNP Security certification, then this is a great place to start...
Security Engineering training
This learning path provides a comprehensive, deep-dive into the world of security engineering. Thirty-one courses build your knowledge and skills around everything from securing storage and devices to implementing and maintaining systems to managing risk and...
Security Architecture training
In the Security Architecture Learning Path, you will learn to solve security problems by understanding the impact on the business and using a risk-driven approach to prioritize and mitigate security risks. This learning path teaches you the necessary skills to...
In this advanced Cisco Security training, Keith Barker prepares learners to take three of the four required exams to earn the CCNP Security certifications: the 300-208 SISAS, 300-206 SENSS, 300-209 SIMOS.
In addition to that, this course covers the 300-207 SITCS exam, which — despite being...
Cloud security is becoming ever more important in today’s business world, with Microsoft Azure at the forefront of most companies’ demands. Microsoft Azure Security Engineers must be able to effectively implement security controls and maintain good security posture, as well as manage internal...
Security Operations (SOC) 201 is an intermediate security operations course designed to enhance your skills in detecting, investigating, and responding to complex cyber threats at scale. After establishing fundamental security operations knowledge and practical skills in SOC 101, the next...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
ICS/SCADA Security Fundamentals training
This learning path introduces the challenges related to securing industrial control systems. You’ll build your ICS/SCADA knowledge by progressing through nine courses. Then test your new skills on the cyber range across 15 hands-on labs. Upon completion...
This learning path builds a foundation of skills around information security auditing. As you progress through 17 courses, you’ll learn how to audit many different aspects of an organization, including business system application and development, disaster recovery and continuity planning...
Certified Computer Security Incident Handler training
This learning path goes in-depth into cyber incident response and prepares you to pass the CERT-Certified Computer Security Incident Handler (CSIH) exam. As you progress through 20 courses tied to five the CSIH domains, you’ll learn how to...
In this course, we will learn how 800-53 fits into the Risk Management Framework (RMF) since the knowledge is fundamental to understanding the importance of the security controls. After studying the steps in RMF, students will discover the history of the 800-53 document based on the revisions to...
Do you need to enforce proper tagging and region restrictions on your Azure resources? Do you need to make sure customers’ data does not leave their country? Need to comply with EU’s GDPR? In this course, Configuring Data Security Policies in Microsoft Azure, you will gain the ability to easily...
What you’ll learn
You will go through a demo on SYN flooding attach using hping3 command
You will go through a demo on Metasploit test. Metasploit is a penetration testing framework that makes hacking simple. It’s an essential tool for many attackers and defenders.
You will start using...
Increase your cyber security capability by learning the fundamentals of cloud security inside of Microsoft Azure!
What you’ll learn
Understand the difference between on-premise and hosted solutions
Understand the differences between SaaS, PaaS, and IaaS
Understand cloud computings...
As powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced professionals equipped with the right cloud security knowledge and skills to...
“Some passwords are just too secure to bother to break.” And some are easy pickings. Ethical hackers in training will appreciate this three-video course on the fundamentals of breaking password security, including multiple approaches to breaking passwords, techniques such as brute-forcing...
At a basic level, organizations must be able to grant access to legitimate users and block requests from those who lack the right permissions in order to operate safely and securely. As a security professional
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text...
At a basic level, organizations must be able to grant access to legitimate users—and block requests from those who lack the right permissions—in order to operate safely and securely. As a security professional, you’re charged with creating and implementing the identity and access management...
What you’ll learn
Become Expert in Computer Networking
Fundamentals of Cybersecurity that will help students to dive in this field and Different Types of Attacks and world famous cyber attack examples
Entire networking related to Cyber security and Terminologies – Threat, Vulnerability...
CISSP certification verifies one has mastery of a multitude of information assurance and cyber security topics, something that’s necessary for IT management and leadership (a job that many CISSP holders fulfill). Our online CISSP training covers topics ranging from operations security...
Prepare for the CompTIA Security+ exam, the leading certification for a career in information security. The latest version, SY0-601, expands coverage of cybersecurity threats, risk management, and IoT threats. This course prepares exam candidates for the third domain of the exam, Cryptography...
Cloud computing has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern, and developing effective methods to protect sensitive information and data...
Learn how to protect your React apps for the real world. I spent years working in React code bases, where security is the main concern. I also spent almost three years working at Auth0, where I learned a lot about authentication and security. I would like to teach you everything that I know...
Learn about the most important security concerns when developing websites, and what you can do to keep your servers, software, and data safe from harm. Instructor Kevin Skoglund explains what motivates hackers and their most common methods of attacks, and then details the techniques and mindset...
Course Overview
This course focuses on Windows Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in
Gaining a better understanding of privilege escalation techniques
Improving Capture...