Packt – Hands-On pfSense 2.x for Firewalls and Routers


Packt – Hands-On pfSense 2.x for Firewalls and Routers
English | Size: 1.05 GB
Genre: eLearning

[Read more…]

Packt Hands On pfSense 2 x for Firewalls and Routers

Packt Hands On pfSense 2 x for Firewalls and Routers
English | Size: 1.05 GB
Category: Tutorial

pfSense is an open-source security suite based on OpenBSD, the world’s most secure operating system. It is used by top-notch network security professionals to provide highly versatile network control complete with advanced traffic routes, firewalls, and monitoring tools.

This course will teach you how to install and configure core pfSense services such as firewalls, routing, and network segregation. You will also learn how to successfully secure, monitor, and maintain your networks with pfSense. Advanced topics include custom firewall rules, automated blocking, virtual private networks, and more! [Read more…]

PLURALSIGHT SOFTWARE DEVELOPMENT SECURITY

PLURALSIGHT SOFTWARE DEVELOPMENT SECURITY
English | Size: 301.09 MB
Category: Tutorial

Most companies have a well-oiled machine with the sole purpose to create, release, and maintain functional software. Still, the growing concerns and risks related with insecure software have brought increased attention to the need to mix security into the development process. In this course, Secure Software Development, you will gain an understanding of the Software Development Life Cycle (SDLC) and the security implications that can arise to ensure that the software your organization uses is well written and secure through its lifespan. First, you will learn about the different options when it comes to following a SDLC. Next, you will delve into the 5 phases that software runs through as it is being developed. Last, you will dive into how vulnerabilities creep into your environment in ways you may have not considered. By the end of this course, you will be able to apply a proper SDLC and ensure that additional attack vectors aren’t created by mistake (or on purpose) to expose your resources and networks. [Read more…]

PLURALSIGHT WINDOWS 10 INTERNALS THREADS MEMORY AND SECURITY

PLURALSIGHT WINDOWS 10 INTERNALS THREADS MEMORY AND SECURITY
English | Size: 578.31 MB
Category: Tutorial

At the core of Windows system level development or research is a thorough knowledge of Windows Internals. In this course, Windows 10 Internals – Threads, Memory and Security, you’ll learn features and enhancements in recent versions of Windows. First, you’ll learn about threads and scheduling. Next, you’ll explore memory management. Finally, you’ll discover how security works in Windows. When you’re finished with this course, you’ll have a foundational knowledge of modern Windows 10 Internals that will help you as you delve into security research or system level development. [Read more…]

PACKT THREAT AND VULNERABILITY ASSESSMENT FOR ENTERPRISES PROPER

PACKT THREAT AND VULNERABILITY ASSESSMENT FOR ENTERPRISES PROPER
English | Size: 2.09 GB
Category: Tutorial

The tech world has been taken over by digitization to a very large extent, and so it’s become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure.

Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism. [Read more…]

LINKEDIN LEARNING SECURITY TIPS WEEKLY UPDATE 20190311

LINKEDIN LEARNING SECURITY TIPS WEEKLY UPDATE 20190311
English | Size: 259.71 MB
Category: Tutorial

Security isn’t just a concern for the tech savvy among us. It matters to everyone with a digital footprint. In this weekly series, instructor Scott Simpson shares practical tips that can help anyone broaden their knowledge of security-no technical pedigree required. Scott dives into topics ranging from password managers to phishing emails, sharing strategies and tools that can help you become more aware of your own security and how to keep your information safe. Tune in every Monday for a brand-new tip.

Note: Because this is an ongoing series, viewers will not receive a certificate of completion. [Read more…]

LINKEDIN LEARNING SECURITY TIPS WEEKLY UPDATE 20190304

LINKEDIN LEARNING SECURITY TIPS WEEKLY UPDATE 20190304
English | Size: 255.39 MB
Category: Tutorial

Security isn’t just a concern for the tech savvy among us. It matters to everyone with a digital footprint. In this weekly series, instructor Scott Simpson shares practical tips that can help anyone broaden their knowledge of security-no technical pedigree required. Scott dives into topics ranging from password managers to phishing emails, sharing strategies and tools that can help you become more aware of your own security and how to keep your information safe. Tune in every Monday for a brand-new tip.

Note: Because this is an ongoing series, viewers will not receive a certificate of completion.
[Read more…]

LEARNING SECURITY TESTING VULNERABILITY MANAGEMENT WITH NESSUS

LEARNING SECURITY TESTING VULNERABILITY MANAGEMENT WITH NESSUS
English | Size: 235.70 MB
Category: Tutorial

It only takes one misconfigured device or missing patch for hackers to infiltrate your network. Fix the flaws in your systems before attackers can find them with Nessus, the network vulnerability scanner popular among cybersecurity analysts, sys admins, and network engineers. Using Nessus, you can scan servers, endpoints, and other network devices and check them against a database of thousands of known vulnerabilities. In this course, instructor Mike Chapple teaches you how to install Nessus, configure scans, and interpret the output. He explains how to create a vulnerability management program as well as a remediation workflow that will help you detect, understand, and resolve vulnerabilities before they are exploited. [Read more…]

LINKEDIN LEARNING ETHICAL HACKING INTRODUCTION TO ETHICAL HACKING

LINKEDIN LEARNING ETHICAL HACKING INTRODUCTION TO ETHICAL HACKING
English | Size: 237.27 MB
Category: CBTs

What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization’s network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it’s one of the most desired skills for any IT security professional. If you’re interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today’s threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more. [Read more…]

Packt – AWS Certified Developer Associate – A Practical Guide


Packt – AWS Certified Developer Associate – A Practical Guide
English | Size: 2.09 GB
Genre: eLearning

[Read more…]

Skip to toolbar