SANS SEC564 Red Team Operations and Threat Emulation

SANS SEC564: Red Team Operations and Threat Emulation
English | Size: 60.93 MB
Category: CBTs

Red Teaming is the process of using tactics, techniques, and procedures (TTPs) to emulate real-world threats to train and measure the effectiveness of the people, processes, and technology used to defend environments. Built on the fundamentals of penetration testing, Red Teaming uses a comprehensive approach to gain insight into an organization’s overall security to test its ability to detect, respond to, and recover from an attack. When properly conducted, Red Team activities significantly improve an organization’s security controls, help hone defensive capabilities, and measure the effectiveness of security operations. [Read more…]

SANS SEC 579 Virtualization and Software-Defined Security

SANS SEC 579: Virtualization and Software-Defined Security
English | Size: 278.76 MB
Category: CBTs

One of today’s most rapidly evolving and widely deployed technologies is server virtualization. SEC579: Virtualization and Software-Defined Security is intended to help security, IT operations, and audit and compliance professionals build, defend, and properly assess both virtual and converged infrastructures, as well as understand software-defined networking and infrastructure security risks. [Read more…]

SANS SEC 555 SIEM with Tactical Analytics 2017

SANS SEC 555 SIEM with Tactical Analytics 2017
English | Size: 380.09 MB
Category: CBTs

Today, security operations do not suffer from a "Big Data" problem but rather a "Data Analysis" problem. Let’s face it, there are multiple ways to store and process large amounts of data without any real emphasis on gaining insight into the information collected. Added to that is the daunting idea of an infinite list of systems from which one could collect logs and it is easy to get lost in the perils of data saturation. This class is the switch from the typical churn and burn log systems to achieving actionable intelligence and developing a tactical Security Operations Center (SOC). [Read more…]

SANS SEC 506 Securing LinuxUnix

SANS SEC 506: Securing Linux/Unix
English | Size: 214.38 MB
Category: CBTS

SEC506: Securing Linux/Unix provides in-depth coverage of Linux and Unix security issues that includes specific configuration guidance and practical, real-world examples, tips, and tricks. We examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memory system, and applications that commonly run on Linux and Unix. [Read more…]

SANS SEC 201 Computing & Technology Essentials PDFs (2017)

SANS SEC 201: Computing & Technology Essentials PDFs (2017)
English | Size: 68.37 MB
Category: CBTs

SEC201 provides students that have no or minimal prior knowledge, or those in need of a refresher, with an understanding of the architecture of modern computers and topics spanning how a CPU works, the addressing of memory and the hardware relationship with operating systems. SEC201 includes an introduction to both Windows and Linux, providing students with plenty of hands-on exercises to build their familiarity with the command line and move their knowledge beyond being a power user to actually understanding the underlying facets of a modern OS. [Read more…]

SANS MGT514 Security Strategic Planning, Policy, and Leadership

SANS MGT514: Security Strategic Planning, Policy, and Leadership
English | Size: 252.08 MB
Category: CBTs

As security professionals we have seen the landscape change. Cybersecurity is now more vital and relevant to the growth of your organization than ever before. As a result, information security teams have more visibility, more budget, and more opportunity. However, with this increased responsibility comes more scrutiny.
[Read more…]

SANS FOR572 Advanced Network Forensics and Analysis

SANS FOR572: Advanced Network Forensics and Analysis
English | Size: 475.96 MB
Category: CBTs

FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS was built from the ground up to cover the most critical skills needed to mount efficient and effective post-incident response investigations. We focus on the knowledge necessary to expand the forensic mindset from residual data on the storage media from a system or device to the transient communications that occurred in the past or continue to occur. Even if the most skilled remote attacker compromised a system with an undetectable exploit, the system still has to communicate over the network. [Read more…]

SANS SEC542 – DVD

SANS SEC542 – DVD
English | Size: 3.32 GB
Category: HACKING | Security

Web applications play a vital role in every modern organization. But, if your organization does not properly test and secure its web apps, adversaries can compromise these applications, damage business functionality, and steal data. Unfortunately, many organizations operate under the mistaken impression that a web application security scanner will reliably discover flaws in their systems. [Read more…]

SANS SEC542 Web App Penetration Testing and Ethical Hacking – VoD

SANS SEC542: Web App Penetration Testing and Ethical Hacking – VoD
English | Size: 4.47 GB
Category: E-learning | Security

Web applications play a vital role in every modern organization. But, if your organization does not properly test and secure its web apps, adversaries can compromise these applications, damage business functionality, and steal data. Unfortunately, many organizations operate under the mistaken impression that a web application security scanner will reliably discover flaws in their systems.
[Read more…]

SANS SEC 579 2016

SANS SEC 579 2016
English | Size: 472.62 MB
Category: Tutorial

One of today’s most rapidly evolving and widely deployed technologies is server virtualization. SEC579: Virtualization and Software-Defined Security is intended to help security, IT operations, and audit and compliance professionals build, defend, and properly assess both virtual and converged infrastructures, as well as understand software-defined networking and infrastructure security risks. [Read more…]