Pluralsight – Eliminating Security Vulnerabilities with NPM Audit

Pluralsight – Eliminating Security Vulnerabilities with NPM Audit
English | Size: 159.74 MB
Category: E-learning | Security | others

Security is a critical piece of any production software, and although it can be tempting to ignore it, doing so will only delay the inevitable. With the npm audit command, addressing security issues is now easier than ever.

Security is critical to any production application, but it can be difficult to identify security vulnerabilities. In this course, Eliminating Security Vulnerabilities with NPM Audit, you will gain an in-depth understanding of how to use npm audit to resolve security vulnerabilities in your JavaScript applications. First, you will see how to run audits and discover what vulnerabilities you have. Next, you will run the audit fix command to fix those vulnerabilities. Finally, you will explore how to deal with vulnerabilities that don’t have published fixes. When you are finished with this course, you will have the skills and knowledge of npm audit needed to keep your applications free of known security vulnerabilities. [Read more…]

Packt Publishing – Web Security – Common Vulnerabilities And Their Mitigation

Packt Publishing – Web Security – Common Vulnerabilities And Their Mitigation
English | Size: 9.59 GB
Category: Tutorial

This course will take less than 8 hours of your time, but it is going to save you a lot of time in the future.

Coat your website with armor, protect yourself against the most common threats and vulnerabilities. Understand, with examples, how common security attacks work and how to mitigate them. Learn secure practices to keep your website users safe. Let’s parse that. How do common security attacks work?: This course walks you through an entire range of web application security attacks, XSS, XSRF, Session Hijacking, Direct Object Reference and a whole lot more. How do we mitigate them?: Mitigating security risks is a web developer’s core job. Learn by example how you can prevent script injection, use secure tokens to mitigate XSRF, manage sessions and cookies, sanitize and validate input, manage credentials safely using hashing and encryption etc. What secure practices to follow?: See what modern browsers have to offer for protection and risk mitigation, how you can limit the surface area you expose in your site. [Read more…]

Finding vulnerabilities with Burp suite and using more features

Finding vulnerabilities with Burp suite and using more features
English | Size: 103 MB
Category: Tutorial

This portion of the course covers manually identifying security vulnerabilities with Burp Suite.
[Read more…]

Pluralsight – Threats, Attacks, and Vulnerabilities for CompTIA Security+

Pluralsight – Threats, Attacks, and Vulnerabilities for CompTIA Security+
English | Size: 422.18 MB
Category: Tutorial

This course covers domain one of the CompTIA Security+ certification exam. In this course, Threats, Attacks, and Vulnerabilities for CompTIA Security+, you’ll learn about the various types of threats and attacks every company faces. First, you’ll learn the ins and outs of Malware, ransom-ware, viruses, Trojans, rootkits, social engineering attacks, application vulnerabilities, and DDoS attacks. Next, you’ll also learn the characteristics of the various types of threat actors, the skills they have and the tools they use. Finally, you’ll learn about penetration testing and vulnerability scanning and how they’re used to help tighten security and mitigate potential breaches. By the end of this course, you’ll have a solid understanding of the various threats you’re likely to face and what tools are available to mitigate these threats. [Read more…]

Packt Publishing – Finding and Exploiting Hidden Vulnerabilities

Packt Publishing – Finding and Exploiting Hidden Vulnerabilities
English | Size: 764.89 MB
Category: Tutorial

When learning about penetration testing, vulnerability assessments play an important role, followed by exploiting the vulnerabilities identified. Finally, everything needs to be documented properly to present to the client. This course focuses on all these elements of the VAPT activity.

Courses focused on teaching Vulnerability Assessment and Penetration Testing sometimes miss out on essential elements such as documentation. Keeping this in mind, the course module has been developed to help you understand the process of VAPT step by step. So here you’ll learn how to perform vulnerability assessments using well-known softwares such as Nessus and OpenVas. [Read more…]