Linkedin Learning – Secure Payments and PCI

Linkedin Learning – Secure Payments and PCI-XQZT
English | Size: 175.42 MB
Category: Tutorial

How are credit card payments processed behind the scenes? And when a credit card is stolen, what usually happens to the compromised data? In this course, Laura Louthan answers these questions and more, explaining how payments get from merchants to banks, as well as the risks associated with the theft or compromise of credit card data-both to customers and banks. Laura highlights the various entities involved in payment processing and how they protect against card data loss. She covers the difference between in-store and online payments and how chip cards have increased online fraud. Plus, learn about the different ways that organizations need to report compliance to the Payment Card Industry (PCI) Security Standards Council, and how your company can move towards full compliance. [Read more…]

Linkedin Learning – Secure Coding in C

Linkedin Learning – Secure Coding in C-XQZT
English | Size: 210.14 MB
Category: Tutorial

C lacks some of the safety valves offered by newer programming languages. But while this midlevel language has its weaknesses, writing safe C code is still possible-it just requires extra vigilance on the part of the developer. In this course, instructor Dan Gookin explains how to identify and code around weaknesses in the C programming language to write more secure programs. Many exploits are known regarding C code; this course reviews each one, explaining the vulnerabilities and how to deal with them. Major areas covered include undefined behavior, avoiding awkward constructions, validating input, managing strings, and working with pointers. [Read more…]

Stone River eLearning AWS IAM The Cloud Engineers Secure Cloud Handbook

Stone River eLearning AWS IAM The Cloud Engineers Secure Cloud Handbook-XCODE
English | Size: 2.37 GB
Category: Tutorial


Release Info: How to manage AWS IAM users, roles, groups How to manage AWS IAM permission policies Understand IAM identities How to secure your AWS resources Enforce fine grained permissions for your AWS users Use encryption for stronger security [Read more…]

INE-Secure Connectivity

INE-Secure Connectivity
English | Size: 3.12 GB
Category: Cisco | Networking | Security


This module focuses on the Secure Connectivity and Segmentation part of the current CCIE Security v5 lab and written exam blueprints, and is meant to teach you fundamental and advanced Virtual Private Network (VPN) technologies and solutions that are normally deployed in modern Cisco (and non-Cisco) Security Architectures. By completing this course, you will understand how to configure, verify and troubleshoot IPv4 and IPv6 VPN technologies, such as IKEv1, IKEv2, IPsec, VRF-Aware IPsec, GRE, FlexVPN, SSL/TLS, Remote Access, AnyConnect, DMVPN, GETVPN, GETVPN G-IKEv2, Tunneling, Cryptography Concepts, PKI, and more. [Read more…]

SKILLSHARE SECURE VPS UBUNTU 18 04 LETSENCRYPT NGINX PHP AND MYSQL

SKILLSHARE SECURE VPS UBUNTU 18 04 LETSENCRYPT NGINX PHP AND MYSQL
English | Size: 2.69 GB
Category: Tutorial

Create and configure your Virtual Private Server (VPS), with a high-security rating, from scratch and step by step.

In this course, learn to create, configure and deploy your VPS server from scratch, set it correctly, with the adequate security measures and the most recommended mechanisms. Always use secure protocols such as SSH to connect with your VPS and HTTPS to protect your websites and projects. Forget the insecure passwords, so you can establish secure connections with your server with the SSH protocol, without problems and achieve anything you need.
[Read more…]

Pluralsight – Secure Network Design

Pluralsight – Secure Network Design
English | Size: 158.76 MB
Category: E-learning | Networking | Security | others

Networks are complex systems of many components that operate in an insecure world. In this course, you will learn how to design and manage secure networks to protect your organizations and improve your effectiveness in managing a security program.
[Read more…]

Udemy – Certified Secure Web Application Engineer (CSWAE)

Udemy – Certified Secure Web Application Engineer (CSWAE)
English | Size: 9.07 GB
Category: Tutorial

Description
The Certified Secure Web Application Engineer (CSWAE) preparatory course is a comprehensive course covering all of the exam topics of the CSWAE certification offered by Mile2. The course helps the students to understand the technologies that are being used under the hood so that they are able to make informed decisions when choosing a cloud vendor. The course also covers the different types of cloud products, their working, their benefits and the migration process to the cloud. The Certified Secure Web Application Engineer (CSWAE) course enables the students to establish industry acceptable auditing standards with current best practices and policies specifically for the web applications and cloud environment. The students are able to learn, implement and test the concepts taught in this course in real-world scenarios. The course is also very helpful for students who are looking forward to appear in and clear the CSWAE certification exam by Mile2. [Read more…]

SANS 540 Secure DevOps and Cloud Application Security 2017

SANS 540 Secure DevOps and Cloud Application Security 2017
English | Size: 342.62 MB
Category: CBTs

This course covers how developers and security professionals can build and deliver secure software using DevOps and cloud services, specifically Amazon Web Services (AWS). It explains how principles, practices, and tools in DevOps and AWS can be leveraged to improve the reliability, integrity, and security of applications. [Read more…]

Cisco AnyConnect Secure Mobility Client v4.x

Cisco AnyConnect Secure Mobility Client v4.x
English | Size: 201.27 MB
Category: Cisco | Networking

1-4.6.00362 ( the latest )
2-4.5.04029
3-4.5.03040
4-4.5.02036
5-4.5.02033
6-4.5.01044 [Read more…]

Packtpub – Secure Your Spring-Based Applications 2017

Packtpub – Secure Your Spring-Based Applications 2017
English | Size: 958.19 MB
Category: Tutorial

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. That’s where Spring Security comes into the picture to simplify things for developers. A lot has changed since version 3 and with version 4.1 in place, there have been several changes and improvements to the Java Configuration, Web Application Security, Authorization, Crypto Module as well as to Testing, along with some that have been deprecated in the current release. This course is an incremental guide that will teach you how to protect your application from malicious users. [Read more…]