Pluralsight – Eliminating Security Vulnerabilities with NPM Audit

Pluralsight – Eliminating Security Vulnerabilities with NPM Audit
English | Size: 159.74 MB
Category: E-learning | Security | others

Security is a critical piece of any production software, and although it can be tempting to ignore it, doing so will only delay the inevitable. With the npm audit command, addressing security issues is now easier than ever.

Security is critical to any production application, but it can be difficult to identify security vulnerabilities. In this course, Eliminating Security Vulnerabilities with NPM Audit, you will gain an in-depth understanding of how to use npm audit to resolve security vulnerabilities in your JavaScript applications. First, you will see how to run audits and discover what vulnerabilities you have. Next, you will run the audit fix command to fix those vulnerabilities. Finally, you will explore how to deal with vulnerabilities that don’t have published fixes. When you are finished with this course, you will have the skills and knowledge of npm audit needed to keep your applications free of known security vulnerabilities. [Read more…]

Checkpoint Security Gateway R80.10 CloudGuard

Checkpoint Security Gateway R80.10 CloudGuard
English | Size: 2.26 GB
Category: Networking | Security | VMware

Check Point Security Gateway CloudGuard protects virtualized environments in private and public clouds from internal and external threats by securing virtual machines and applications with the full range of Check Point Software Blades and central management. Check Point Security Gateway CloudGuard product is integrated with VMware NSX Manager ecosystem, using NetX API.
This is the standard OVF template that deploys Check Point Security Gateway as Service VM. [Read more…]

CBT Nuggets – ISC2 Security CISSP

CBT Nuggets – ISC2 Security CISSP

CBT Nuggets – ISC2 Security CISSP
English | Size: 2.79 GB
Category: E-learning | Security

In this 29-video course, trainer Keith Barker covers information security concepts in each of the Common Bodies of Knowledge (CBK), including authentication, VPNs, cryptography, and much more!

This in-depth training will help you prepare for the CISSP exam, but you’ll also need at least 5 years of experience and a personal recommendation to earn certification. [Read more…]

(ISC)² – Systems Security Certified Practitioner (SSCP) Official on Demand Video Course [2018]

(ISC)² – Systems Security Certified Practitioner (SSCP) Official on Demand Video Course [2018]
English | Size: 8 GB
Category: CBTs

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification.

Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. [Read more…]

Check Point Security Gateway R77.30 vSEC for NSXv4 OVF

Check Point Security Gateway R77.30 vSEC for NSXv4 OVF
English | Size: 3.9 GB
Category: Networking | Security | VMware

The vSEC Gateway is deployed into the NSX fabric to prevent lateral threat movement between applications inside the data center. The OVF template deploys Check Point Security Gateways as service VMs.

The Check Point vSEC for VMware NSX and VMware NSX integrated solution delivers dynamic orchestration of advanced threat prevention for all data center traffic Software-Defined Data Center (SDDC). vSEC/Cloudguard for VMware NSX abstracts the physical infrastructure so that the capacity can be pooled and repurposed, and provides programmatic control to allow virtual machines to be dynamically created and managed. Complete integration with vCenter and NSX delivers full visibility of all data center objects in security policy. [Read more…]

ISE Posture Services for CCNP Security (300-208) SISAS

ISE Posture Services for CCNP Security (300-208) SISAS
English | Size: 324.75 MB
Category: CBTs

This course dives into the world of Network Admission Control (NAC) using Cisco ISE for posture assessment. The topics covered in this course prepare you for the 300-208 SISAS exam.

Knowing what the posture of devices connecting to the network is a daunting task, especially when there are so many different types of devices. In this course, ISE Posture Services for CCNP Security (300-208) SISAS, you’ll learn how to use Cisco ISE to posture clients as they come on to the network and control the type of access they gain. First, you’ll explore the components of posture services. Next, you’ll discover how to setup ISE to support posture services. Finally, you’ll configure ISE to posture devices and control access. When you’re finished with this course, you’ll know how to implement posture services in an enterprise network. [Read more…]

CCNA Security 2018 210-260 Video Boot Camp With Chris Bryant

CCNA Security 2018 210-260 Video Boot Camp With Chris Bryant
English | Size: 9.96 GB
Category: Tutorial

This course is currently being refreshed for the 210-260 exam. Over 10 hours of new videos are ready for you.
[Read more…]

SANS SEC511 Continuous Monitoring and Security Operations (2015)

SANS SEC511: Continuous Monitoring and Security Operations (2015)
English | Size: 98.73 MB
Category: CBTs

SEC511.1: Current State Assessment, Security Operations Centers, and Security Architecture
SEC511.2: Network Security Architecture
SEC511.3: Network Security Monitoring
SEC511.4: Endpoint Security Architecture
SEC511.5: Automation and Continuous Security Monitoring
SEC511.6: Capstone: Design, Detect, Defend [Read more…]

INE CCIE Security including WSA

INE CCIE Security including WSA
English | Size: 907.06 MB
Category: Cisco | E-learning | Networking | Security

INE Security including WSA Config and Videos
[Read more…]

Hands-On Security in DevOps

Hands-On Security in DevOps
English | Size: 3.57 MB
Category: Tutorial

DevOps has provided speed and quality benefits with continuous development and deployment methods, but it does not guarantee the security of an entire organization. Hands-On Security in DevOps shows you how to adopt DevOps techniques to continuously improve your organization’s security at every level, rather than just focusing on protecting your infrastructure.
[Read more…]