برچسب: Security

Today, all enterprises, large and small depend on VoIP to provide voice communication both internally and externally to the company. Most organizations even have dedicated Voice VLANs and/or physical ports to carry VoIP traffic. Hence, it is important to understand VoIP traffic, security concerns and its encryption/decryption for network forensics and Red-Blue teaming purposes. This course does exactly that!

ادامه مطلب

Most of us have used Wireshark either academically or professionally for traffic analysis. Its a great tool for microscopic analysis of what is happening in the network. However, its greatest strength is also its greatest weakness i.e. it is extremely difficult to do macroscopic analysis, create custom reports, extract only certain fields from packets for offline analysis etc. This is where Tshark comes in! Tshark is a command line tool created by the Wireshark team and shares the same powerful parsing engine as Wireshark. It is capable of doing most things we’ve come to love Wireshark for, but with the “from command line” advantage. This makes it ideal for batch analysis, offline processing and routine automation of traffic analysis tasks. In this course, we will explore many of these capabilities. It is assumed you have a basic working knowledge of Wireshark and traffic analysis.

ادامه مطلب

The C|SCU curriculum is designed to educate computer users on the more practical aspects of networking and security, allowing them to expand their computer skills. Students will develop a foundational understanding of a variety of computer and network security concerns, including identity theft, credit card fraud, online banking phishing scams, malware, loss of sensitive information, and social engineering. This certification is an excellent complement to educational offerings in the domain of security and networking.

ادامه مطلب

Have you ever wondered about how web applications are attacked in the real world and what you can do to mitigate every attack? The Web Defense Professional Learning Path will illustrate exactly how each attack works, what the impact of each attack is, how to fix it, and how the exploit no longer works after the fix. This learning path will also give you in-depth, practical advice about how to simplify your defense and how to implement attack mitigations that actually work (regardless of you having access to the source code or not).

Learning path at a glance:

  • Close the gap between Web application attack and defense
  • Mitigation advice for multiple platforms and languages
  • The most comprehensive and practical coverage of the OWASP Testing Guide
  • Comprehensively aligned to OWASP methodologies, tools, and tests
  • Covers and goes beyond OWASP TOP 10
  • Detailed techniques and methodology to simplify the defense of web applications
  • No boring theory: practice-oriented curriculum
  • Over 20 different lab scenarios to practice with
  • Advanced usage of OWASP ZAP, OWASP OWTF, ModSecurity…
  • Coverage of OWASP Cheat Sheets, OWASP OpenSAMM, OWASP ModSecurity Core Rule Set
ادامه مطلب

Are you interested in learning how to professionally analyze, handle, and respond to security incidents on heterogeneous networks and assets? The Incident Handling & Response Professional Learning Path will help you understand the mechanics of modern cyber-attacks and how to detect them. This learning path will actually teach you how to effectively use and fine-tune open-source IDS, log management, and SIEM solutions in order to detect and even hunt for intrusions. Specifically, you will analyze traffic, flows, and endpoints, as well as utilize analytics and tactical threat intelligence during the learning process. The Incident Handling & Response Professional Learning Path also prepares you for the eCIR exam and certification.

ادامه مطلب

Designed for professionals that are just starting their defensive cybersecurity or security engineering journey, this learning path will introduce you to all of the concepts and skills you’ll need to succeed as a Defensive Security Engineer. Starting with an introduction to security engineering, and moving into more in-depth topics covering practical defensive engineering techniques and practices, this path will teach you the skills you need for a successful cybersecurity career. In addition, you will learn basic server and network hardening techniques, risk management strategies, how to properly design a secure architecture, and much more. With hands-on labs throughout, you’re not just reading slides and studying – you get your hands dirty working with real-world scenarios. This path will prepare learners for the eEDA certification releasing in 2023!

ادامه مطلب