Showing 127–135 of 533 results

  • Security , Shop

    SANS SEC564: Red Team Exercises and Adversary Emulation

    In SEC564, you will learn how to plan and execute an end-to-end adversary emulation, including how to plan and build a red team program, leverage threat intelligence to map against adversary tactic, techniques, and procedures (TTPs), emulate those TTPs, report and analyze the results of red team exercises, and ultimately improve the overall security posture of the organization.

    You …

  • Security , Shop

    SANS FOR585: Smartphone Forensic Analysis In-Depth (PDF-VID-LAB-MP3)

    FOR585 is continuously updated to keep up with the latest malware, smartphone operating systems, third-party applications, acquisition shortfalls, extraction techniques (jailbreaks and roots) and encryption. It offers the most unique and current instruction to arm you with mobile device forensic knowledge you can immediately apply to cases you’re working on the day you get back to work.

    This in-depth smartphone forensic …

  • Security , Shop

    SANS SEC560: Enterprise Penetration Testing (PDF-VID-LAB)

    SEC560 prepares you to conduct successful penetration testing for a modern enterprise, including on-premise systems, Azure, and Azure AD. You will learn the methodology and techniques used by real-world penetration testers in large organizations to identify and exploit vulnerabilities at scale and show real business risk to your organization. The course material is complemented with 30+ practical lab exercises concluding …

  • Security , Shop

    SANS SEC545: Cloud Security Architecture and Operations (PDF-VID-LAB)

    SEC545 offers an in-depth breakdown of security controls, services, and architecture models for public cloud environments. We cover brokering and security-as-a-service to help better secure SaaS access, containers and PaaS architecture and security considerations, and the entire spectrum of IaaS security offerings and capabilities. Between the lecture and a number of detailed hands-on labs, security operations, engineering, and architecture professionals …

  • Security , Shop

    SANS SEC488: Cloud Security Essentials (PDF-VID-LAB)

    More businesses than ever are moving sensitive data and shifting mission-critical workloads to the cloud, and not just to one cloud service provider (CSP). Organizations are responsible for securing their data and mission-critical applications in the cloud. The benefits in terms of cost and speed of leveraging a multicloud platform to develop and accelerate delivery of business applications and analyze …

  • Security , Shop

    SANS SEC540: Cloud Security and DevSecOps Automation (PDF-VID-LAB)

    SEC540 provides security professionals with a methodology to secure modern Cloud and DevOps environments. Students learn how to implement more than 20 DevSecOps security controls to build, test, deploy, and monitor cloud infrastructure and services. Immersive hand-on labs ensure that students not only understand theory, but how to configure and implement each security control. By embracing the DevOps culture, students …

  • Security , Shop

    Beginner’s Guide to IoT and Hardware Hacking

    The Beginner’s Guide to IoT and Hardware Hacking course teaches foundational skills and techniques required to get started performing security research and testing on IoT devices and hardware. This course focuses mainly on the hardware aspects of IoT hacking and how to use the underlying access to physical hardware to aid in and amplify the ability to hunt for vulnerabilities. While …

  • Security , Shop

    Hands-on Vulnerability Management with QualysGuard

    Vulnerability management is a complex process and understanding the risks security loopholes pose in your network is key to tackling them. By automating the process of identifying and addressing vulnerabilities before attackers exploit them, the risk of a cyber breach is eliminated. With automation, you can accelerate the process of remediation by eliminating manual processes and repetitive steps. Thus, increasing …

  • Security , Shop

    INE – Host & Network Penetration Testing Exploitation

    Exploitation consists of the tactics, techniques, and procedures that attackers/adversaries utilize to gain an initial foothold on a target system and consequently the target network. The ability to identify and exploit vulnerabilities is an important skill to master on your journey to becoming a skilled penetration tester. In this course, you will learn about how to identify vulnerabilities on a …