SANS 501 – Advanced Security Essentials – Enterprise Defender

SANS 501 – Advanced Security Essentials – Enterprise Defender
English | Size: 354.1 MB
Category: Tutorial

Effective cybersecurity is more important than ever as attacks become stealthier, have a greater financial impact, and cause broad reputational damage. SEC501: Advanced Security Essentials – Enterprise Defender builds on a solid foundation of core policies and practices to enable security teams to defend their enterprise.
[Read more…]

Malware Analysis Course for IT security

Malware Analysis Course for IT security
English | Size: 466.68 MB
Category: CBTs

Malware Analysis for IT Security lays the Groundwork for the course by presenting the key tools and
techniques malware analyst use to examine malicious programs. You will learn how to
save time by Exploring malware in two phases. Behavioral analysis focuses on the Specimen’s interaction
with its Environment such as Registry, Network, the File system
Code Analysis focuses on the specimen’s code and make use of a disassembler and a debugger. You will learn
how to build a Secure Laboratory to perform such analysis in a controlled manner [Read more…]

Malcolm Shore’s Cyber Security Courses [All 19 Courses]

Malcolm Shore’s Cyber Security Courses [All 19 Courses]
English | Size: 5.6 GB
Category: Tutorial

Dr. Shore was the principal security officer at the Australian National Broadband Network Company and the director of education and community relations for the Australian Information Security Association. He’s currently a technical director at BAE Systems Applied Intelligence, and an educator in the fields of forensics, information warfare, security management, and applied cryptography. He holds a PhD in information security. [Read more…]

ITPro.tv – Certified Information Systems Security Professional (UPDATED 2018) Domain [1 to 5]

ITPro.tv – Certified Information Systems Security Professional (UPDATED 2018) Domain [1 to 5]
English | Size: 19.73 GB
Category: Tutorial

The Certified Information Systems Security Professional (CISSP) certification is the gold standard in the IT Security field. Security professionals that have achieved their CISSP designation are regarded as some of the most talented and knowledgeable people in their field. The certification demonstrates that the holder has been working in IT Security for over five years, has a broad range of knowledge in ten domains related to creating, supporting and maintaining a secure IT infrastructure and can implement things like risk management and risk identification. [Read more…]

Hacking Web Applications (The Art of Hacking Series) Security Penetration Testing for Today’s DevOps and Cloud Environments

Hacking Web Applications (The Art of Hacking Series) Security Penetration Testing for Today’s DevOps and Cloud Environments
English | Size: 11.88 GB
Category: CBTS

More than 5 hours of video instruction to help you perform ethical hacking, penetration testing, and security posture assessment through compromising, analyzing, and mitigating web application vulnerabilities.

Hacking Web Applications (The Art of Hacking Series) LiveLessons provides step-by-step, real-life scenarios for performing security assessments (penetration testing) through web application vulnerabilities.
[Read more…]

CBT Nuggets – CCNA Security 210-260 updated

CBT Nuggets – CCNA Security 210-260 updated
English | Size: 7.7 GB
Category: Cisco | E-learning | Networking | Security

Join Keith Barker as you develop the skills required to support a security infrastructure, recognize threats and vulnerabilities to networks and systems, and mitigate security threats. The Cisco CCNA Security exam addresses core security technologies, as well as the installation, troubleshooting, and monitoring of network devices to maintain confidentiality, integrity, and availability of data and devices.
[Read more…]

PS – Security Event Triage Detecting Network Anomalies with Behavioral Analysis

PS – Security Event Triage Detecting Network Anomalies with Behavioral Analysis
English | Size: 432.11 MB
Category: Tutorial

Developing the skills necessary for a security analyst to properly detect and triage advanced network intrusion tactics and techniques requires experience and the use of advanced detection capabilities. Neither of which are easily obtained. In this course, Security Event Triage: Detecting Network Anomalies with Behavioral Analysis, you will learn foundational knowledge required to separate good network traffic from bad and identify a myriad threat actor activity on an enterprise network. First, you will learn how to use frequency analysis to detect command and control, automated logins, and beaconing. [Read more…]

Lynda Security Testing Nmap Security Scanning

Lynda Security Testing Nmap Security Scanning
English | Size: 222.79 MB
Category: Tutorial

In this course, learn how to use this open-source tool for port scanning of systems and
network devices. [Read more…]

Packt Publishing – Linux Security and Hardening, The Practical Security Guide

Packt Publishing – Linux Security and Hardening, The Practical Security Guide
English | Size: 637.51 MB
Category: CBTs

Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers! This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step. By the end of this course, you will be able to tighten up the security on any Linux system. You’ll learn the security weaknesses of the Linux operating system and will be given step-by-step instructions on how to protect those weaknesses. You’ll even learn some security concepts that apply to information security as a whole while focusing on Linux-specific issues that require special consideration. What you learn in this course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux, and more. [Read more…]

Pluralsight – Eliminating Security Vulnerabilities with NPM Audit

Pluralsight – Eliminating Security Vulnerabilities with NPM Audit
English | Size: 159.74 MB
Category: E-learning | Security | others

Security is a critical piece of any production software, and although it can be tempting to ignore it, doing so will only delay the inevitable. With the npm audit command, addressing security issues is now easier than ever.

Security is critical to any production application, but it can be difficult to identify security vulnerabilities. In this course, Eliminating Security Vulnerabilities with NPM Audit, you will gain an in-depth understanding of how to use npm audit to resolve security vulnerabilities in your JavaScript applications. First, you will see how to run audits and discover what vulnerabilities you have. Next, you will run the audit fix command to fix those vulnerabilities. Finally, you will explore how to deal with vulnerabilities that don’t have published fixes. When you are finished with this course, you will have the skills and knowledge of npm audit needed to keep your applications free of known security vulnerabilities. [Read more…]