Catalog Search Results
Author
Pub. Date
2019.
Language
English
Description
Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
Ethical hacking involves testing to see if an organization's network is vulnerable to outside threats. Denial-of-service (DoS) attacks are one of the biggest threats out there. Being able to mitigate DoS attacks is one of the most desired skills for any IT security professional—and a key topic...
Author
Pub. Date
2022.
Language
English
Description
Learn the basics of how to use Burp Suite, the popular web application penetration testing tool.
Burp Suite, the popular web application penetration testing tool, has quickly become one of the preferred choices of security professionals around the world. In this course, instructor Malcolm Shore provides you with an in-depth look at how to use Burp Suite to meet all of your pen testing needs. Explore the basics of the Burp Suite user interface as...
Author
Pub. Date
2021.
Language
English
Description
This course provides a hands-on introduction to programming in the x86 assembler and shows you how it can be used to access system functions through the Windows API.
In this course, instructor Malcolm Shore offers you a hands-on introduction to programming in both the 32 bit and 64 bit x86 assembler and shows how you can use it to access system functions through the Windows API. First, Malcolm shows you how to install and test the GoAsm assembler,...
Author
Pub. Date
2022.
Language
English
Description
Explore the next phase of your career in ethical hacking with advanced techniques to safely enter and operate on more complex networks and systems.
Once you’re proficient with basic ethical hacking techniques, you may be wondering about your next play. Advanced skills in evasion become increasingly necessary when you’re entering and operating on more complex systems. In this course, instructor Malcolm Shore shows you techniques to become a savvier...
Author
Pub. Date
2023.
Language
English
Description
Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.
Set a rock-solid foundation for your network, users, and data by learning about the basics of cybersecurity. Join security expert Malcolm Shore as he describes how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST and...
Author
Pub. Date
2021.
Language
English
Description
Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.
Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targets and in optimizing their penetration testing. In this course, instructor Malcolm Shore teaches the basic methods of enumerating networks and targeting systems with common enumeration tools. Malcolm explains what enumeration...
Author
Pub. Date
2020.
Language
English
Description
Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.
More and more companies are migrating their applications and infrastructure to the cloud, shifting operational aspects to service providers such as Microsoft and Amazon. However, cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and systems...
Author
Pub. Date
2022.
Language
English
Description
Discover some of the most effective, commonly used cybersecurity tools in the rising field of software composition analysis.
Component libraries are critical for secure software development. They’re included in the frameworks used to run your end systems and web applications, but sometimes the components contain flaws. In this course, instructor Malcolm Shore gives an overview of the basic concepts of software composition analysis, showing you...
Author
Pub. Date
2021.
Language
English
Description
Discover how to use Python to test your AWS deployments for vulnerabilities that are unique to the cloud.
Pen testing is a standard technique for on-site systems, but the way testing is carried out in the cloud is different. This course explores the different types of vulnerabilities in the cloud, the techniques used to test cloud deployments, and key open-source tools for testing Amazon Web Service deployments: CloudGoat, the AWS CLI, and the AWS...
Author
Pub. Date
2016.
Language
English
Description
Learn how to secure your organization's mobile devices and test iOS and Android applications for security flaws—key topics on the Certified Ethical Hacker exam.
Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique set of vulnerabilities, which hackers are all too willing to exploit. Security professionals need to know how to close the gaps and protect devices, data, and...
Author
Pub. Date
2022.
Language
English
Description
Learn the basics of cybersecurity and network testing through practical, hands-on demonstrations.
Learn how to protect your network from cyberattacks through practical, hands-on demonstrations. In this course, Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyberattacks can take, as well as the two most common types of...
Author
Pub. Date
2020.
Language
English
Description
Learn about the challenges of migrating legacy COBOL applications to modern environments, and get tips for doing so smoothly.
Despite the arrival of myriad new and modern languages, COBOL still rules many government and legacy computing systems. Many of these systems are due to be retired, and the organization's applications must be migrated to a modern environment. In this course, learn about the ways in which developers can migrate legacy COBOL...
Author
Pub. Date
2019.
Language
English
Description
Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.
The key to effectively protecting your systems is understanding the attacks you have to defend them against. Join instructor Malcolm Shore for a hands-on introduction to the many different types of malware that can be used to exploit a target computer. Explore ethical hacking strategies to: Protect your data from different types of...
Author
Pub. Date
2019.
Language
English
Description
Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.
Ethical hacking—testing to see if an organization's network is vulnerable to outside attacks—is a desired skill for many IT security professionals. In this course, cybersecurity expert Malcolm Shore prepares you to take your first steps into testing client defenses. Malcolm...
Author
Pub. Date
2021.
Language
English
Description
Learn how to use Kali Linux for advanced penetration testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting.
Kali Linux is the penetration-testing professional's main tool, and includes hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course, Malcolm Shore teaches you advanced pen testing with Kali, including stealthy testing, privilege escalation, and pivoting....
Author
Pub. Date
2016.
Language
English
Description
IT security professionals: Learn how to identify and repair vulnerabilities in your wireless networks. This course is part of our Certified Ethical Hacker test prep series.
Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks...
Author
Pub. Date
2021.
Language
English
Description
Learn how you can use SABSA, a leading security architecture framework, to architect security into a business-driven cloud deployment.
The security required for cloud deployments is quite different from the security applied to on-site infrastructure. In order to ensure the most effective cloud security, cloud deployments should be properly architected. In this course, instructor Malcolm Shore shows how to do this using the SABSA enterprise security...
Author
Pub. Date
2022.
Language
English
Description
Take your pen testing skills to the next level. Learn how to locate and exploit website vulnerabilities with Burp Suite, sqlmap, and more.
Websites are one of the most vulnerable pieces of information technology, since their contents are exposed to access from the internet. By understanding how attackers locate and exploit these vulnerabilities, you can help build more secure websites and protect web applications. This course shows you how to perform...
Author
Pub. Date
2019.
Language
English
Description
Find out about the protocols used to access websites, and how to test websites and web applications to prevent exploitation through cyberattacks.
Websites and web applications are—by their very nature—accessible remotely, which puts them at high risk of cyberattacks. Knowing how to detect and prevent web attacks is a critical skill for developers and information security professionals alike. In this course, find out about existing and emerging...
Author
Pub. Date
2021.
Language
English
Description
Learn to operate with a zero trust approach to network security.
The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsiders worked effectively for years, but it’s no longer a viable option in today’s world. Workers working remotely, insider threats, and attackers taking advantage of trust between internal systems—these demand a new approach to extending protection to all users and their devices, regardless...
Didn't find it?
Can't find what you are looking for? Try our Purchase Suggestion Service. Submit Request