Linkedin – Learning CCSP Cert Prep 3 Cloud Platform Infrastructure Security

Linkedin – Learning CCSP Cert Prep 3 Cloud Platform Infrastructure Security-SHEPHERDS
English | Size: 356.98 MB
Category: Tutorial


Modern businesses are charged with keeping troves of sensitive data safe in the cloud. These companies need IT professionals who have a solid grasp of core infrastructure components and security controls. Earning the Certified Cloud Security Professional (CCSP) certification validates your cloud security knowledge and makes you stand out to potential employers. In this course, learn how to design a secure cloud operating environment as you prepare for the third domain of the CCSP exam: Cloud Platform and Infrastructure Security. Learn about the components of cloud infrastructure and how to design a secure data center. Plus, see how to design and plan out security controls, disaster recovery, and business continuity strategies. [Read more…]

Pluralsight – Security Event Triage Operationalizing Security Analysis

Pluralsight – Security Event Triage Operationalizing Security Analysis-BOOKWARE-KNiSO
English | Size: 87.03 MB
Category: Tutorial


Keeping up with advanced cyber threats and sifting through the insurmountable number of alerts available to security analysts is not sustainable without leveling up your security analysis skills to keep pace with modern security operations. In this course, Security Event Triage: Operationalizing Security Analysis, you will gain foundational knowledge of modern cybersecurity continuous monitoring techniques and processes. First, you will learn how the security analyst fits into the overall cybersecurity posture of an organization. Next, you will discover the technologies and methodologies covered in the security event triage path. Finally, you will map the knowledge, skills, and abilities taught in each of the security event triage courses to the MITRE ATT&CK techniques that comprise the chain of compromise used by the simulated threat actors. When you’re finished with this course, you will have the skills and knowledge of security analysis needed to identify and interrogate all manner of cyber threats. [Read more…]

Pluralsight – Cyber Security Course Collection – Part 2

Pluralsight – Cyber Security Course Collection – Part 2
English | Size: 13.19 GB
Category: HACKING | Networking | Security


Ransomware attacks have surged recently. You see all types of organizations and users impacted by this threat. It is estimated that ransomware will increase in frequency and impact in the coming months and years. In this course, Cybersecurity Threats: Ransomware, you’ll receive comprehensive knowledge of typical infection points where ransomware can get into your systems and understand the options you have to recover your encrypted files. First, you’ll discover what tools are available, many of them free, to help you recover a system that has suffered a ransomware attack. Next, you’ll explore what you need to be aware of if you decide to pay the ransom to avoid some pitfalls. Finally, you’ll learn how to defend your network and system and create an incident response plan to have at the ready should your systems be attacked. By the end of this course, you’ll have all the necessary skills and knowledge to manage the threat of ransomware. [Read more…]

CCIE Security Version 5 lab config Video

CCIE Security Version 5 lab config Video
English | Size: 1006.89 MB
Category: Tutorial


Cloudmylab offers a platform to run any lab topology. CCIE Security v5 lab has been adopted from various vendors and is built on the topology and configuration provided by them. We have designed this lab with customers and online forum feedback. The Lab topology mentioned below is mostly virtual and it aligns with Cisco’s CCIE V5 blueprint.
[Read more…]

Cyber Security – Python and Web Applications

Cyber Security – Python and Web Applications
English | Size: 3.08 GB
Category: E-learning | HACKING | Security


Learn a practical skill-set in detecting and defeating online threats and become a Cyber Security Specialist – not just in theory – but in practice.

Go from a beginner to advanced in this easy to follow expert course by building security analysis tools using the wildly popular Python programming language, along with analyzing web application security vulnerabilities and solutions using frameworks like Ruby on Rails and php.
[Read more…]

Pluralsight – Software-Defined Perimeter SDP Leveraging Zero Trust to Create a New Network and Security Architecture

Pluralsight – Software-Defined Perimeter SDP Leveraging Zero Trust to Create a New Network and Security Architecture-XQZT
English | Size: 134.27 MB
Category: Tutorial


One of today’s biggest problems is that network infrastructure and applications are wide open to severe security threats. In this course, Software-Defined Perimeter (SDP): Leveraging Zero Trust to Create a New Network and Security Architecture, you will learn foundational knowledge to protect all valuable assets from both external and internal threats. First, you will learn why you need to adopt a zero trust software-defined perimeter. Next, you will discover the functions of a software-defined perimeter and the advantages this will bring you. Finally, you will explore how to create a software-defined perimeter. When you’re finished with this course, you will have the skills and knowledge needed to secure your infrastructure and applications from a variety of attacks that are common today [Read more…]

Packt – Hands-on Linux Host Security for SysAdmins

Packt – Hands-on Linux Host Security for SysAdmins
English | Size: 325.58 MB
Category: E-learning | Linux | Security


Everyday we learn about new cyber attacks against large organizations, which are coming to the realization that nothing is safe in the modern world. In this course, Linux Host Security, you will gain the the skills needed to start your Linux server down and protect your precious data and resources. First, you will learn to tune the Linux Kernel using the procfs and sysctl. Next, you will discover how much traceability you lose when you have not installed the Linux Audit System. Finally, you will explore how to deploy the Integrated Identity Management tool, FreeIPA Server on CentOS 7. When you’re done with this course, you will have the skills and knowledge of Linux Security that you need to harden your Linux Servers. [Read more…]

Linkedin – Learning Security Outsourcing Vendor Selection and Management

Linkedin – Learning Security Outsourcing Vendor Selection and Management-RiDWARE
English | Size: 217.71 MB
Category: Tutorial


Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience [Read more…]

Linkedin – Learning Web Security User Authentication and Access Control-QUASAR

Linkedin – Learning Web Security User Authentication and Access Control-QUASAR
English | Size: 142.55 MB
Category: Tutorial


User authentication plays a central role in almost everything we do online. From apps to hardware and websites, user accounts and logins are everywhere. Authentication is critical for verifying a user’s identity online and for confirming permissions so individuals can perform privileged actions. In this course instructor Kevin Skoglund teaches you how authentication works how to implement it correctly when building web applications walks you through some of the most common attacks, and shows you how to protect your site. He also demonstrates how to secure your own passwords and digital identity so you can work securely. This course is ideal for all developers, particularly those who are interested in authentication and security [Read more…]

Google Cloud Security Essentials

Google Cloud Security Essentials
English | Size: 2.64 GB
Category: E-learning | Linux | others


This course will teach the core fundamentals necessary to properly secure your Google Cloud environment, and manage who has access to what resources. The concepts introduced in this course are necessary for any security considerations on Google Cloud. [Read more…]