Udemy – Mobile Security – Reverse Engineer Android Apps From Scratch
This is an introductory course suitable for cyber security newcomers as well as cyber security professionals who would like to dive into the world of mobile security. In recent years, Android has...
View ArticlePluralSight – Security Event Triage-analyzing Live System Process And Files
Traditional forensic analysis on endpoints is outpaced by modern attack techniques. This course will teach you how to efficiently identify and investigate malicious activity by performing live system...
View ArticleManning – Angular Security and Deployment (Angular for Java Developers – Part 5)
Angular for Java Developers Part Five: Security and Deployment teaches you how to put an Angular frontend into production, ready for real users. In this fifth and final course in the Angular for Java...
View ArticleSkillShare – The Complete Guide to Building a NIST Information Security Program
Skillshare.The.Complete.Guide.to.Building.a.NIST.Information.Security.Program-SkilledHares Title: The Complete Guide to Building a NIST Information Security Program Publisher: Skillshare Category:...
View ArticlePluralSight – Security Orchestration Automation And Response Soar-the Big...
This course will take you through the next big thing in Security Operations SOAR. It will guide you in your journey to evaluate and implement a SOAR platform Security Orchestration, Automation and...
View ArticleSkillShare – WordPress Security Step By Step Ultimate Guide
Skillshare.WordPress.Security.Step.By.Step.Ultimate.Guide-SkilledHares Title: WordPress Security – Step By Step Ultimate Guide Publisher: Skillshare Category: Technology Size: 567M Files: 12F Date:...
View ArticleUdemy – Palo Alto Security Administrator – Part 1+2 PCNSA (EDU-210)
Security Operating Platform and Architecture, Initial Configuration, Interface Configuration, Security and NAT Policies, App-ID, Content-ID URL Filtering, Decryption, WildFire, User-ID, GlobalProtect,...
View ArticleOffensive-Security – AWE – Advanced Windows Exploitation 2.0
Modern exploits for Windows-based platforms require modern bypass methods to circumvent Microsoft’s defenses. In Advanced Windows Exploitation (EXP-401), OffSec challenges students to develop creative...
View ArticleO’Reilly – Software Architecture Hour Architecture and Security With Aaron Bedra
Join us for a special conversation on software architecture with Neal Ford and security pro Aaron Bedra, covering the fascinating aspects of the discipline, interesting convergence areas, and insights...
View ArticlePluralSight – Enabling Security Governance And Compliance In Devsecops
This course will teach you the importance of strong Security Governance and Compliance. Learn to leverage DevSecOps pipelines for automatic compliance using Compliance as Code,” a critical part of...
View ArticleSkillShare – Cyber Security Training for Employees
Skillshare.Cyber.Security.Training.for.Employees-SkilledHares Title: Cyber Security Training for Employees Publisher: Skillshare Category: Technology Size: 1404M Files: 10F Date: 2021-04-20 Course #:...
View ArticlePWK Offensive Security OSCP Book Version 2.0.1 2021
PWK – Penetration Testing With Kali Linux OSCP Book Version 2.0.1 2021 rapidgator.net/file/c48260e43f8ce878dc5a354e7e9f22f4/PWK_%5BOSCP%5D_v2.0.1.rar.html...
View ArticleUdemy – CCNP SECURITY – SVPN 300-730 PART 23 by Sikandar Shaik
What you’ll learn =========== Implementing Secure Solutions with Virtual Private Networks v1.0 (SVPN 300-730) is a 90-minute exam associated with the CCNP Security Certification. Tests a network...
View ArticlePluralSight – Software Development Security For CISSP
This course will teach you the skills needed to integrate security principles into software development Secure software development practices are essential in today’s high-stakes world. In this course,...
View ArticleUdemy – Cisco IOS Security Guide to Implement a Basic Firewall
Learn How to Use your Cisco router or switch Firewall Capabilities This course is all about IOS security and all features that you can find to harden your router and switch and use your router as a...
View ArticleLinkedin Learning – CCSK Cert Prep 3 Managing Cloud Security and Risk
Advance your preparation for the CCSK exam and learn the skills necessary to identify cloud-based assets and related risks Outsourcing IT services to public cloud providers introduces and changes...
View ArticleLinkedin Learning – Security Tips Protecting Sensitive Information
Learn tips to protect and exchange sensitive information using encryption and other tools While we often think of our communications channels as secure, it never hurts to add an extra layer of...
View ArticleLinkedin Learning – Using SABSA to Architect Cloud Security
Learn how you can use SABSA, a leading security architecture framework, to architect security into a business-driven cloud deployment The security required for cloud deployments is quite different from...
View ArticleLinkedin Learning – CISSP Cert Prep 2021 7 Security Operations
Use this course to help you prepare for the Security Operations domain of the 2021 CISSP exam Are you preparing to take the Certified Information Systems Security Professional (CISSP) exam, or maybe an...
View ArticleLinkedin Learning – Google Cloud Security
Learn how to develop a foundation of cloud security within the Google Cloud Platform If you’re new to cloud security, or if you’re an administrator looking to learn about best practices to create and...
View Article