SANS SEC564 Red Team Operations and Threat Emulation

SANS SEC564: Red Team Operations and Threat Emulation
English | Size: 60.93 MB
Category: CBTs

Red Teaming is the process of using tactics, techniques, and procedures (TTPs) to emulate real-world threats to train and measure the effectiveness of the people, processes, and technology used to defend environments. Built on the fundamentals of penetration testing, Red Teaming uses a comprehensive approach to gain insight into an organization’s overall security to test its ability to detect, respond to, and recover from an attack. When properly conducted, Red Team activities significantly improve an organization’s security controls, help hone defensive capabilities, and measure the effectiveness of security operations. [Read more…]

CySA+ Cert Prep: 1 Threat Management | Mike Chapple | LYNDA

CySA+ Cert Prep: 1 Threat Management | Mike Chapple | LYNDA
English | Size: 540.79 MB
Category: CBTs

Earning the CompTIA Cybersecurity Analyst (CySA+) certification demonstrates to potential employers that you have a solid understanding of how to tackle cybersecurity threats using a behavioral analytics-based approach. This course-the first installment in the CySA+ Cert Prep series-can provide you with a foundational understanding of threat management practices, and prepare you to confidently approach the Threat Management domain of the CySA+ exam. Instructor Mike Chapple includes coverage of cybersecurity threats and controls, reconnaissance techniques, penetration testing, reverse engineering, and security analytics. He also covers network security and endpoint security topics. [Read more…]

Pluralsight – Threat Modeling Fundamentals

Pluralsight – Threat Modeling Fundamentals`
English | Size: 155.02 MB
Category: Tutorial

Security is important. You want to build more secure applications. You don’t want to bolt on security afterwards, but you want to make sure it’s there from the get-go – for each project. Threat Modeling is a growing field of interest for software developers, architects and security professionals. With good reason, as this can be a very effective way to accomplish those goals. In this course, Threat Modeling Fundamentals, you’ll dive deeper into the fundamentals of threat modeling including a short exercise to help you follow along. [Read more…]

Pluralsight – Threat Intelligence: The Big Picture

Pluralsight – Threat Intelligence: The Big Picture
English | Size: 159.46 MB
Category: Tutorial

Security incidents have become harder to detect, mostly because of the increase in malware complexity and variety. In this course, Threat Intelligence: The Big Picture, you’ll learn the foundational knowledge of Cyber Threat Intelligence. First, you’ll explore how to classify indicators of compromise using industry standard methodologies. Next, you’ll discover how to search for and consume existing intelligence about the threats that you’re dealing with. Finally, you’ll cover how to maintain the quality of malware detections with a solid set of best practices. When you’re finished with this course, you’ll have the skills and the knowledge of threat intelligence to implement it into your current incident handline process.
[Read more…]

Pluralsight – Threat Modeling – The Big Picture

Pluralsight – Threat Modeling – The Big Picture
English | Size: 106.65 MB
Category: CBTs

In this course, you’ll be provided with a high-level overview of what threat modeling is, how it can be used, and potential challenges you may face when attempting to use threat modeling for your day to day activities, projects, or environments.
Whether you’re a developer, executive, ethical hacker, or just have an avid interest in protecting yourself: You cannot protect something unless you understand what you’re protecting it from. In this course, Threat Modeling: The Big Picture, you’ll be provided with a high-level overview of the ins and outs of threat modeling. First, you’ll cover what threat modeling is and how it can be used to identify the types of attacks you might vulnerable to.
[Read more…]