PS – Performing Threat Modeling with the Microsoft Threat Modeling Methodology

PS – Performing Threat Modeling with the Microsoft Threat Modeling Methodology
English | Size: 238.98 MB
Category: E-learning | HACKING | Microsoft | Networking | Security | others

Finding security bugs after the software has been built can lead to two things: exploitation of the bug in the wild, or spending a fortune to fix it. In this course, Performing Threat Modeling with the Microsoft Threat Modeling Methodology, you will gain the ability to analyze your software and find threats to it before any line of code is written. First, you will learn how to diagram an application to clearly show how all of its parts work together. Next, you will discover how to use diagrams to find threats using techniques such as STRIDE. Finally, you will explore how to document and mitigate threats to your software. When you’re finished with this course, you will have the skills and knowledge of threat modeling needed to anticipate threats and deal with them before they cause damage. [Read more…]

Performing Network Vulnerability Scanning with Nexpose

Performing Network Vulnerability Scanning with Nexpose
English | Size: 352.81 MB
Category: Tutorial

In this course, you will learn how to deploy the Nexpose tool against a variety of different targets. You will create your own custom templates and tune them to create specific policies that match the target you are assessing. [Read more…]

Performing Malware Analysis on Malicious Documents

Performing Malware Analysis on Malicious Documents
English | Size: 460.24 MB
Category: CBTs

Malicious documents have become a form of malware that all incident responders need to be able to analyze. This course will teach you how to analyze malicious Adobe PDF and Microsoft Office documents, along with any malicious scripts they contain. [Read more…]

Lynda – Performing a Technical Security Audit and Assessment

Lynda – Performing a Technical Security Audit and Assessment
English | Size: 632.03 MB
Category: CBTs

This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course, you’ll know how to determine if your network is secure.
[Read more…]

Pluralsight – Performing and Analyzing Network Reconnaissance

Pluralsight – Performing and Analyzing Network Reconnaissance
English | Size: 1.10 GB
Category: Tutorial

Seeing what is currently being exposed about your networks and company resources is vital. This course will provide a fundamental understanding of both reconnaissance and scanning and how it can affect your security posture.
You’ve been tasked as an "Incident Handler" and you are wondering where you start. Attackers typically start with doing a little "reconnaissance" of their target, so it only makes sense that you start there as well. In this course, Performing and Analyzing Network Reconnaissance, you will learn how to think like an attacker in order to stay a step ahead of one. First, you will learn about the two different steps of reconnaissance and scanning. Next, you will learn what to look for, how it’s done, and what you can do to protect your infrastructures.
[Read more…]

Pluralsight – Performing OSINT Gathering on Corporate Targets

Pluralsight – Performing OSINT Gathering on Corporate Targets
English | Size: 804.10 MB
Category: CBTs

Open Source Intelligence (OSINT) gathering is a critical component of penetration testing. This course will teach you how to gather various forms of corporate OSINT, including physical, logical, org chart, electronic, infrastructure, and financial.
While many organizations are focusing their resources on implementing internal security controls, few turn their attention to the open source intelligence (OSINT) that attackers exploit in an effort to circumvent those controls. In this course, Performing OSINT Gathering on Corporate Targets, you’ll learn foundational knowledge of gathering various forms of corporate OSINT as part of a penetration test. First, you’ll explore tools and techniques for collecting OSINT. [Read more…]

Skip to toolbar