Lynda – Microsoft Azure Security Technologies AZ-500 Cert Prep 3 Manage Security Operations

Lynda – Microsoft Azure Security Technologies AZ-500 Cert Prep 3 Manage Security Operations-APoLLo
English | Size: 129.08 MB
Category: Tutorial


Cybersecurity skills are in high demand, and the Microsoft Azure Security Technologies (AZ-500) exam is a great opportunity for IT professionals to showcase their skills to current and future employers. In this course, Pete Zerger helps prepare test takers to excel in the Managing Security Operations domain of the AZ-500 exam. Pete provides end-to-end coverage of each of the exam objectives for this domain, providing hands-on demonstrations along the way. Learn how to configure diagnostic logging and log retention, configure centralized policy management using Azure Security Center, configure a playbook for a security event using Azure Security Center, create and customize alerts to deliver timely notification of important changes and events in your Azure subscription, and more. [Read more…]

Skillshare – Cyber Security Go From Zero to Hero

Skillshare – Cyber Security Go From Zero to Hero-ViGOROUS
English | Size: 589.09 MB
Category: Tutorial


The field of technology is growing exponentially with the IT sector flourishing every day. Amidst such growth of the industry and increased concern for privacy, the demand for security is rising. Cybersecurity has become an everyday struggle for many businesses. Recent trends and statistics reveal that there is a huge increase in hacked and breached data from very common sources at workplaces. So go for this course to get a better understanding of cyber security! [Read more…]

Infosec – AWS Essentials Security and Costs

Infosec – AWS Essentials Security and Costs
English | Size: 212.95 MB
Category: Tutorial


Explore AWS cost and security with this course and prepare yourself for your certification journey.
Before getting too deep into anything, it’s important to know what your limits are and what you can expect. Explore two of the most critical parts of any plan with this course covering AWS security, cost, documentation and the certification path [Read more…]

Linkedin Learning – AWS Enterprise Security Online Class

Linkedin Learning – AWS Enterprise Security Online Class-ZH
English | Size: 609.88 MB
Category: Tutorial


Understanding and successfully implementing security concepts is essential to using Amazon Web Services (AWS) as your enterprise solution. In this course instructor Sharif Nijim couples pragmatic advice with practical examples that show IT pros how to create a secure infrastructure within AWS. Sharif explores the shared responsibility model of security, which splits duties between your company and AWS, and introduces key Identity and Access Management (IAM) concepts, including users, groups, roles, and policies. Discover how to manage access to Simple Storage Service (S3); implement detective controls within AWS including how to work with AWS Config and GuardDuty; use protective tools such as AWS Shield; and use AWS Key Management Service (KMS) to manage access keys. Plus, learn how to prepare for the inevitable audit of your AWS account(s) [Read more…]

Cyber Security Source Code Defender (CSCD)

Cyber Security Source Code Defender (CSCD)
English | Size: 1.38 GB
Category: E-learning | HACKING | Security | others


About the Cyber Security Source Code Defender Certificate:
The Cyber Security Source Code Defender is a knowledge-based certificate offered by CSTT. As part of CCTT certificate program, the certificate is particularly relevant for recent college/university graduates and professionals in IT space, and those looking for a career change to cybersecurity. [Read more…]

Packt – Python for Automating Information Security

Packt – Python for Automating Information Security-RiDWARE
English | Size: 575.12 MB
Category: Tutorial


Learn
Read and modify exploit scripts so they can be used in a real penetration test
Analyze a packet capture file to look for network traffic anomalies
Collect open-source intelligence (OSINT) to speed up the passive-intelligence-gathering phase of a penetration test
Analyze a log file for suspicious activity [Read more…]