[Pluralsight] Elastic Stack Fundamentals – Learning Paths

  About This skill is intended to provide a foundational competence of the Elastic Stack. With this core knowledge in place, you will be able to leverage its capabilities and functions for security analysis, incident response, and threat hunting.   Description In this section, you will learn how to efficiently collect, analyze, and display information […]

[CBT Nuggets] Fortinet NSE 4 Certification Training – FortiOS 7.x

  Description: In this 203-video, entry-level training, CBT Nuggets trainer Keith Barker covers the knowledge security technicians need to take responsibility for the configuration, monitoring and operation of FortiGate devices in day-to-day network security operations. This intermediate NSE 4 training prepares learners to take the Fortinet NSE 4 – FortiOS exam, which is the one […]

[Antisyphon Training] SOC Core Skills w/ John Strand

  Description This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have.   KEY TAKEAWAYS • Core networking skills • Live Windows Forensics • Live Linux Forensics […]

[O’REILLY] Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition

  Video Description Designed to help you pass the EC-Council Certified Ethical Hacker (CEH) certification exam.   Overview The Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition gives you a complete overview of the topics in the EC-Council’s updated Certified Ethical Hacker (CEH), V11 exam. This video course has six modules that dive into […]

[Pearson] From IT to DevOps

  Video description 8 Hours of Video Instruction DevOps is a set of practices that works to automate and integrate the processes between software development and IT teams so they can build, test, and release software faster and more reliably. These days, it is imperative for engineers in the IT industry to understand what DevOps […]

[PentesterAcademy] Python for Pentesters

  Description This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administrators who want to learn to automate tasks or go beyond just using ready made tools. We will be covering topics in system security, network […]

[O’REILLY] GIAC Security Essentials (GSEC)

  Description: GIAC Security Essentials (GSEC) Complete Video Course will provide the learner with everything they need to know for exam success, including all required key security concepts and terminologies, and effective techniques to detect and prevent all known attacks. The GIAC Security Essentials (GSEC) Complete Video Course has been designed to provide the learner […]

[PentesterAcademy] Container Security | Beginner Edition Bootcamp

  On-Demand: Container Security: Beginner Edition Bootcamp   Description: A hands-on introduction to Container Security, this bootcamp shows you how misconfigured components can lead to breakout attacks and eventually, host compromise.   What You’ll Learn: This is a 4-session beginner bootcamp that will teach you the basics of containers and how to secure them. You […]

[PentesterAcademy] DevSecOps Beginner Edition Bootcamp [2021]

  On-Demand: DevSecOps: Beginner Edition Bootcamp   Description: Get a hands-on introduction to DevSecOps basics with a focus on implementing Devops and DevSecOps pipelines in on-premise, hybrid and on-public cloud models.   What You’ll Learn: This is a 4-session beginner bootcamp that will teach you the basics of DevSecOps. You will learn how to use […]

[CBT Nuggets] Palo Alto Certified Network Security Engineer (PCNSE)

  PCNSE Online Training: This intermediate Palo Alto PCNSE training prepares learners to take the PCNSE exam, which is the one required exam to earn the Palo Alto Networks Certified Network Security Engineer (PCNSE) certification.   PCNSE: What You Need to Know: For any security engineer using this training for exam preparation, our Palo Alto […]

[InfoSec] CISSP Certification Boot Camp

  Take your career to the next level by earning one of the most in-demand cybersecurity certifications. Infosec’s CISSP training provides a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional.   Overview: Earning your CISSP requires a broad range of cybersecurity skills, from developing security […]

[PentesterAcademy] Web Application Security Bootcamp [2021]

  On-Demand: Web Application Security: Beginner Edition Bootcamp   Description: A beginner-friendly introduction to the Open Web Application Security Project® (OWASP) Top 10 vulnerabilities, where you will build a solid foundation in pentesting modern web applications with different attack tools.   What You’ll Learn: Web application security is as old as the web. However, today, […]

[PacktPub] Automation Solutions with Chef Automate [Video]

  Video Details ISBN 9781839219597 Course Length 3 hours 12 minute   About We live in a world of heterogeneous applications and managing them can be quite daunting. Creating, maintaining, and upgrading a scalable infrastructure requires significant effort and resources. Time spent on repetitive daily tasks can consume a big chunk of an IT/system engineer’s […]

[PentesterAcademy] Cloud Security: AWS Bootcamp [2021]

  Description Most AWS deployments are breached by a common set of vulnerabilities which attackers repeatedly use. In 5 weeks, this bootcamp teaches you to identify, exploit and secure vulnerabilities in the 5 most commonly used AWS components, so you can be a job-ready Cloud Security practitioner.   What You’ll Learn The syllabus of this […]

[CodeRed] End To End Mobile Security

  A comprehensive dive into the world of mobile security   Course Overview The more that we become connected the more we need to be conscious of mobile security. Contacts, emails, passwords, location data, confidential documents, photos, etc. are all contained on our phones and thus are a prime target for malicious hackers and leaked […]

[Consensys Academy] Blockchain Developer Program On-Demand

  Description The fully self-paced version of our Online Developer Bootcamp, we start off by teaching you about the underpinnings of blockchain technology and show how it all comes together to allow us to build the next generation of web applications.   Details This end-to-end Ethereum developer course is a robust, self-paced course that has […]

[Lynda] Risk Management for IT and Cybersecurity Managers

  Author: Jason Dion Released: 4/24/2020 Duration: 1h 22m Skill Level: Beginner   About Curious about why leaders at your organization decided not to fund your project? In this course, get an inside look at how cybersecurity and information technology (IT) managers use a preliminary risk analysis to determine which projects to pass on and […]

[PacktPub] Python for Automating Information Security [Video]

  By Thomas McNeela   About this video The process of finding and eradicating an attacker is time-consuming and costs a lot, which hurts your organization. You need to write tools that will help you automate your defensive and offensive security. As a penetration tester, you need to evolve quickly. When off-the-shelf tools and exploits […]

[SkillShare] Learn AWS Step By Step With 3 Projects

  Mukesh Ranjan, Learn Everything Step By Step About This Class LEARN AWS STEP BY STEP is the Course  designed exclusive for Freshers and Beginners who want learn AWS. In this course you will be learning the AWS services in Step By Step Manner with manual steps using AWS Management Console . We will be […]

[A Cloud Guru] AWS Security Best Practices (2020)

  Learn what cloud security is all about and how to use the principle of shared responsibility to build a secure environment for your applications within the AWS Cloud ecosystem.   ABOUT THE COURSE Some of the most commonly heard reasons for why a company can’t move to the cloud are concerns around security: “Our […]

[PacktPub] Securing Your AI and Machine Learning Systems [Video]

  Alexander Polyakov January 22, 2020 2 hours 10 minutes Design secure AI/ML solutions More Information Learn Design secure AI solution architectures to cover all aspects of AI security from model to environment Create a high-level threat model for AI solutions and choose the right priorities against various threats Design specific security tests for image […]

[O’REILLY] Getting Started with Blockchain and Cryptocurrency

by George Levy Publisher: Addison-Wesley Professional Release Date: November 2019 ISBN: 9780135898369 Video Description 3+ Hours of Video Instruction   Overview In this course, participants learn what blockchain and cryptocurrency are, how they work, and how these technologies are being applied. The course explains what smart contracts are and how they work, the rise of […]

[PacktPub] AWS Certified Cloud Practitioner (CLF-C01) [Video]

  Rajesh Daswani November 26, 2019 13 hours 0 minutes A comprehensive study guide for the AWS Certified Cloud Practitioner exam More Information Learn Introduction to the AWS Certified Cloud Practitioner qualification and cloud computing AWS Identity and Access Management (IAM) Amazon Simple Storage Service (S3), Storage Gateway, and Snowball AWS networking and content delivery […]

[Pluralsight] Securing the Application Lifecycle in Microsoft Azure

By Reza Salehi Do you manually maintain your Azure resources’ security health? Has your team accidentally checked in sensitive credentials into the source control? Need cloud tests for your app service? If the answer is yes, this course can greatly help you. Course info Level: Advanced Updated: Oct 1, 2019 Duration: 1h 4m Description Manually […]

[SKILLSHARE] PHP MYSQL : Create Secure Login and Registration System with Email Verification

Jazeb Akram, Freelancer, Web Developer About This Class This course will focus on the process of User Registration and Login System in which students will build the complete project shown in promo video by using HTML CSS PHP and MYSQL. This course will cover the followings How to secure user cardinals Password Encryption Hashing Algorithms Project Complete Registration system […]

[teamtreehouse] Introduction to Data Security

48-minute Security Course About this Course Keeping data and communications secure is one of the most important topics in development today. In this course, we’ll look at common methods of protecting both of these areas. What you’ll learn Encryption Hashing End-to-end encryption Size: 313.26M

[Lynda] Firewall Administration Essential Training

Author Sean Colins Released 5/18/2017 Firewalls are integral for IT professionals who need to secure and monitor network traffic. In this course, learn how to plan for, deploy, administer, and maintain a network firewall. Sean Colins provides an overview of the role of a firewall, and how it’s used to secure traffic on an organization’s […]