CBT Nuggets – Getting Started with Microsoft Identity and Access Management What is IAM

CBT Nuggets – Getting Started with Microsoft Identity and Access Management What is IAM
English | Tutorial | Size: 2.64 GB


This intermediate Getting Started with Microsoft Identity and Access Management training teaches learners how to ensure their users are who they say they are and that they have access to everything they need. [Read more…]

Red Team Getting Access w Michael Allen

Red Team Getting Access w Michael Allen
English | Tutorial | Size: 15.47 GB


Getting a foothold is the first step in a successful breach-be it in the form of user credentials, email access, or code execution on a target system. [Read more…]

Pluralsight – Managing Access And Secrets In Hashicorp Vault

Pluralsight – Managing Access And Secrets In Hashicorp Vault
English | Tutorial | Size: 398.8 MB


This course will teach you how to access, manage, and store secrets in several backends with Hashicorp Vault. [Read more…]

CBT Nuggets – Microsoft Identity and Access Administrator (SC-300)

CBT Nuggets – Microsoft Identity and Access Administrator (SC-300)
English | Tutorial | Size: 3.06 GB


This intermediate Microsoft Identity and Access Administrator (SC-300) training prepares learners to implement and manage identity and access management solutions in both small businesses and enterprises. [Read more…]

Linkedin Learning – OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures

Linkedin Learning – OWASP Top 10 1 Broken Access Control and 2 Cryptographic Failures-XQZT
English | Tutorial | Size: 87.40 MB


No one is immune to security vulnerabilities when it comes to web applications. [Read more…]

LinkedIn – CompTIA Security+ (SY0-601) Cert Prep 4 Identity and Access Management Design and Implementation

LinkedIn – CompTIA Security+ (SY0-601) Cert Prep 4 Identity and Access Management Design and Implementation
English | Tutorial | Size: 289.5 MB


The CompTIA Security+ certification is the leading entry-level IT certification for those looking to break into the exciting field of cybersecurity. [Read more…]