PS – Security Event Triage Detecting Network Anomalies with Behavioral Analysis

PS – Security Event Triage Detecting Network Anomalies with Behavioral Analysis
English | Size: 432.11 MB
Category: Tutorial

Developing the skills necessary for a security analyst to properly detect and triage advanced network intrusion tactics and techniques requires experience and the use of advanced detection capabilities. Neither of which are easily obtained. In this course, Security Event Triage: Detecting Network Anomalies with Behavioral Analysis, you will learn foundational knowledge required to separate good network traffic from bad and identify a myriad threat actor activity on an enterprise network. First, you will learn how to use frequency analysis to detect command and control, automated logins, and beaconing. [Read more…]

PS – Troubleshooting Cisco SIP Trunks, CUBEs, and URI Dial Plans

PS – Troubleshooting Cisco SIP Trunks, CUBEs, and URI Dial Plans
English | Size: 597.83 MB
Category: Programming | Cisco | E-learning | Networking | others

In today’s fast-paced world, the ability to communicate using real-time IP voice and video technology is a business necessity. In this course, Troubleshooting Cisco SIP Trunks, CUBEs, and URI Dial Plans, you will learn how to diagnose SIP problems, use various tools and techniques to collect traces and debugs, understand the call process, and come up with solutions. First, you will see how to identify the major components of the Cisco SIP Collaboration solution you’re working with so that you will be able to isolate the problem areas quickly during troubleshooting. Next, you will be able to use a variety of Cisco debug, trace, and monitoring tools that are available to assist with your troubleshooting. Finally, you will learn how to implement an action plan that uses a systematic troubleshooting approach to provide consistent network services and minimize service interruptions. When you’re finished with this course, you’ll have the skills and knowledge needed to troubleshoot SIP trunks, CUBEs, and URI components that will help you diagnose and troubleshoot issues in Cisco Collaboration deployments. [Read more…]

PS – Performing Threat Modeling with the Microsoft Threat Modeling Methodology

PS – Performing Threat Modeling with the Microsoft Threat Modeling Methodology
English | Size: 238.98 MB
Category: E-learning | HACKING | Microsoft | Networking | Security | others

Finding security bugs after the software has been built can lead to two things: exploitation of the bug in the wild, or spending a fortune to fix it. In this course, Performing Threat Modeling with the Microsoft Threat Modeling Methodology, you will gain the ability to analyze your software and find threats to it before any line of code is written. First, you will learn how to diagram an application to clearly show how all of its parts work together. Next, you will discover how to use diagrams to find threats using techniques such as STRIDE. Finally, you will explore how to document and mitigate threats to your software. When you’re finished with this course, you will have the skills and knowledge of threat modeling needed to anticipate threats and deal with them before they cause damage. [Read more…]

PS – Getting Started with Nmap

PS – Getting Started with Nmap
English | Size: 191.95 MB
Category: Cisco | E-learning | HACKING | Networking | Security | others

Nmap, or network mapper, is a tool that has been around for more than 20 years. In this course, Getting Started with Nmap, you will learn how this versatile tool can be broken down into phases that are easily understood and implemented. First, you will go over Nmap installation and command structure. Next, you will move progressively through each scan phase until you are leveraging more advanced features. Finally, you will have the opportunity to apply what you learn to a scenario where you use Nmap to evaluate network devices. By the end of the course, you will have a basic understanding of how to use Nmap for internal security testing and will be running your own commands to detect applications running on your devices. [Read more…]

PS – Deploying, Administering, and Securing Palo Alto Firewalls

PS – Deploying, Administering, and Securing Palo Alto Firewalls
English | Size: 358.46 MB
Category: Programming | E-learning | Networking | others

Now, more than ever before, there are more sophisticated threats geared towards enterprise networks and disrupting their day-to-day business, requiring a comprehensive solution to mitigate and prevent these attacks. In this course, Deploying, Administering, and Securing Palo Alto Firewalls, you will gain the ability to protect your network using Palo Alto’s Next Generation Firewall. First, you will learn how firewalls have evolved over the years to combat ever changing threats, and how Palo Alto is leading the way. Next, you will discover how to deploy the firewall out-of-the-box and configure administrative and back-end settings. Lastly, you will explore how to setup routing, create security zones, addresses, applications and service objects, and how to tie it all together into a security policy to shape your network’s traffic. When you are finished with this course, you will have the skills and knowledge of a Network Security Engineer needed to administer Palo Alto’s Next Generation Firewall. [Read more…]

PS – High-performance Data Warehousing with Amazon Redshift

PS – High-performance Data Warehousing with Amazon Redshift
English | Size: 388.88 MB
Category: Tutorial

Amazon Redshift has an excellent performance reputation, but not by accident. This course focuses on performance and related topics such as architecture, design, configuration best practices, query plans, performance monitoring, and troubleshooting.
Resume CourseBookmarkAdd to Channel [Read more…]

PS – Microsoft Operating System Fundamentals

PS – Microsoft Operating System Fundamentals
English | Size: 1.6 GB
Category: Tutorial

Windows 10 is nearly ubiquitous in consumer/business environments. Gain the Windows 10 management skills you need now to support your users and attain the Microsoft Certified Associate (MTA) Windows Operating Systems Fundamentals certification. [Read more…]

PS – Linux Email Services (LPIC-2)

PS – Linux Email Services (LPIC-2)
English | Size: 324.97 MB
Category: CBTs

Table of contents
Description
1.Course Overview1m 56s
2.Welcome to Linux Email Services6m 29s
3.Reviewing Objectives on the LPI Website3m 12s
4.Summary and What’s Next2m 20s

5.What Is Required to Set up the Lab4m 48s
6.Verify Your Lab Setup6m 28s
7.Summary 2m 48s
[Read more…]

PS – Building an Enterprise Private Blockchain on Salesforce

PS – Building an Enterprise Private Blockchain on Salesforce
English | Size: 205.59 MB
Category: Tutorial

Private blockchains can have a major role in securing enterprise data while maintaining tight access and privacy controls. In this course, you’ll use specific examples on the Salesforce platform to know about the role of blockchain in the enterprise.
Table of contents
1.Course Overview2m 15s
2.Our Journey Begins3m 16s
3.A Brief Introduction to Blockchain (It’s a Ledger!)4m 16s
4.Distributed Blockchains and Cryptocurrency4m 37s
5.Distributed Blockchains and the Enterprise4m 9s
6.Blockchain Mania4m 20s [Read more…]