Search the Community
Showing results for tags 'security'.
-
Palo Alto Networks Certified Network Security Administrator (PCNSA) Study Guide - Author: Palo Alto Networks - Format: PDF, 174 pages - First published: April 2022 - Link download: [Hidden Content]
- 32 replies
-
- 159
-
Hi all welcome back start registering here in the community more releases are coming soon. Please find the link [Hidden Content]
- 250 replies
-
- 1453
-
CCNP and CCIE Security Core SCOR 350-701 (Exam Blueprint 1.1) by Omar Santos Released April 2024 Publisher(s): Pearson ISBN: 0138358222 Introduction Lesson 1 Introduction to the CCNP and CCIE Security Certifications Lesson 2 Cybersecurity Concepts Lesson 3 Network Security Lesson 4 Securing the Cloud Lesson 5 Content Security Lesson 6 Endpoint Protection and Detection Lesson 7 Identity Management and AAA Lesson 8 Secure Network Access, Visibility, and Enforcement Lesson 9 Preparing for the Exam Summary [Hidden Content]
- 20 replies
-
- 183
-
- SCOR 350-701
- CCNP
-
(and 1 more)
Tagged with:
-
please anyone can get us this course Implementing IPSec You never know who's listening. Implementing IPsec for encrypting communication between sites is one of the first lines of defense in a Network Security Engineer's toolkit to prevent a data breach. In this course you will learn how to implement LAN-to-LAN IPsec Tunnels on both Cisco IOS and Juniper JunOS to provide secure connectivity between your network sites.
- 14 replies
-
- 128
-
Cisco CCNP Security SNCF (Exam 300-710) Anthony Sequeira/Ronnie Wong [Hidden Content] What you will learn • Configure AWS VPC for Cisco Firewall and IPS systems • Deploy and manage FMCv and NGFWv in AWS • Implement NGFW Routed and Transparent modes • Explore multi-instance deployments and clustering • Troubleshoot using CLI/GUI and perform packet capture • Enhance security with Cisco AMP and other integrations Chapter 1 Building a Practice Lab Chapter 2 Deployment Chapter 3 Management and Troubleshooting Chapter 4 Integration Chapter 5 Configuration [Hidden Content]
- 20 replies
-
- 117
-
Linux Security Techniques [Hidden Content] What you will learn • Implement various Linux security features effectively. • Manage and audit logs with syslog and journald. • Secure filesystems and configure firewalls. • Protect services with SELinux and isolate applications. • Encrypt data using LUKS and GPG. • Perform security testing to verify configurations and data encryption. Chapter 1 Monitoring and Auditing Security Chapter 2 Data Security Chapter 3 Securing Services Chapter 4 Securing Networks Chapter 5 Security Testing [Hidden Content]
- 9 replies
-
- 68
-
- linux
- linux Security
-
(and 1 more)
Tagged with:
-
Cisco CCNP Security SCOR (Exam 350-701) by Anthony Sequeira, Ronnie Wong [Hidden Content] • Identify and mitigate network threats • Implement on-prem and cloud security • Understand modern cryptographic solutions • Utilize Python for security automation • Configure Cisco Firepower and Umbrella • Manage network security with Cisco tools Chapter 1 Network Security and Cryptography Fundamentals Chapter 2 Advanced Network Security and Configuration Techniques Chapter 3 Cloud Security Essentials Chapter 4 Cisco Security Solutions Configuration and Analysis Chapter 5 Endpoint Security and Management Strategies Chapter 6 Advanced Cisco Network Security Techniques [Hidden Content]
-
This intermediate Microsoft Security Operations Analyst training covers the objectives in the SC-200 exam, which is the one required exam to earn the Security Operations Analyst certification. [Hidden Content]
- 23 replies
-
- 85
-
- microsoft
- Microsoft 365
-
(and 6 more)
Tagged with:
-
For those of you who's looking for a Splunk Tutorial, click and enjoy. 😁 [Hidden Content]
- 24 replies
-
- 262
-
Generative AI Security Conference by Omar Santos Released May 2024 Publisher(s): Pearson ISBN: 0135353327 Table of contents Introduction and Opening Remarks Is Your Network at Risk? How Can AI Help You? Revolutionizing Cybersecurity with an AI-Driven SOC Validating Generative AI: How to Secure Your Models and Data Closing Remarks [Hidden Content]
-
Does Anybody has Sophos Certified Administrator XG Firewall official Learning Material including Training Videos?
-
Free Download [OFFER] Spring Security 6 with JWT Published 1/2024 Created by Tushar Girase MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 21 Lectures ( 59m ) | Size: 376 MB Spring Security What you'll learn: Understand Spring Security Concepts Implement Spring Security in application Secure implementation of REST APIs Understanding of Spring Security module Requirements: Basic Knowledge of Spring Rest, Hibernate and JPA Basic Knowledge of Spring Boot Description: This course is intended for the beginners and experience Java developers working with spring framework. Security is an important aspect of the modern REST API. Spring security is the most popular and used framework to secure your application. It is important to understand the concepts of spring security and how it is implemented based on which you can have your own implementation of the Spring Security for your application to be more secure. JWT is again a most popular technology to implement the token based authentication and authorization. In this course you will learn about Core Concepts of Spring Security. We will deep dive into the spring security and its core concepts which are must for any developer who is working in spring framework. Will also look at the concepts and try to understand why the implementation is given in that way. For all possibilities of the customizations offered by spring security framework. We will implement the authentication and authorization using JWT tokens. In the end of the course we will implement an use case of Library Management System where all the authenticated users can access book records but only admins will be able to add new book records to system. Who this course is for: Beginner Spring Boot Developers Beginner /Experienced Java Developers Beginner /Experienced Spring MVC Developers Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live [hide] No Password - Links are Interchangeable
-
CHFI - Digital Forensics and Cyber Crime with Kali Linux Fundamentals_13.5hrs - LL info : https://www.oreilly.com/library/view/digital-forensics-and/9780134693644/ [hide] https://mega.nz/file/KKJ1CKaA wgmkpywuRvMOtCXwcVNb2K5BU3Dxevmjk2bb74z1pY8 [/hide] Looking4more --> kali --> https://www.certcommunity.org/forum/topic/2121-offer-kali-linux-tutorial-beginners-packt/ --> kali --> https://www.certcommunity.org/forum/topic/2122-offer-kali-linux-2017-itprotv/ ! ! 🙂 Geia Mas ( cheers Mates !) 🙂 ! !
- 31 replies
-
- 261
-
This is our 5-day Advanced-level web application security testing course. Much like our popular Advanced Infrastructure Hacking class, this class talks about a wealth of hacking techniques to compromise web applications, APIs, cloud components and other associated end-points. This class focuses on specific areas of appsec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). The class allows attendees to practice some neat, new and ridiculous hacks which affected real life products and have found a mention in real bug-bounty programs. The vulnerabilities selected for the class either typically go undetected by modern scanners or the exploitation techniques are not so well known. Note: Attendees will also benefit from a state-of-art Hacklab and we will be providing free 30 days lab access after the class to allow attendees more practice time. Course Overview Advanced Web Hacking course talks about a wealth of hacking techniques to compromise web applications, APIs and associated end-points. This course focuses on specific areas of app-sec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). This hands-on course covers neat, new and ridiculous hacks which affected real life products and have found a mention in real bug-bounty programs. In this course vulnerabilities selected are ones that typically go undetected by modern scanners or the exploitation techniques are not so well known. Course Details You will be able to: • Effectively exfiltrate data using Out of Band Techniques for certain vulnerabilities • Pen Test encrypted parameters to find vulnerabilities • Learn how to bypass SSO functionalities • Find SQL injection vulnerabilities not detected by Automated tools • Break weak crypto implementations • Learn ways to bypass password reset functionalities You will receive: Access to a hacking lab not just during the course but for 30 days after the class too. This gives them plenty of time to practice the concepts taught in the class. Numerous scripts and tools will also be provided during the training, along with student handouts. Our courses also come with detailed answer sheets. That is a step by step walkthrough of how every exercise within the class needs to be solved. These answer sheets are also provided to students at the end of the class. What you can take away from the course: • The latest hacks in the world of web hacking. The class content has been carefully handpicked to focus on some neat, new and ridiculous attacks. • We provide a custom kali image for this class. The custom kali image has been loaded with a number of plugins and tools (some public and some NotSoPublic) and these aid in quickly identifying and exploiting vulnerabilities discussed during the class. • The class is taught by a real Pen Tester and the real-world stories shared during the class help attendees in putting things into perspective. Prerequisites Who Should Take This Class? • Web developers • SOC analysts • Intermediate level penetration testers • DevOps engineers, network engineers • Security architects • Security enthusiasts • Anyone who wants to take their skills to the next level You will need: Students must bring their own laptop and have admin/root access on it. The laptop must have a virtualization software (virtualbox / VMWare) pre installed. A customized version of Kali Linux (ova format) containing custom tools, scripts and VPN scripts for the class will be provided to the students. The laptop should have at least 4 GB RAM and 20 GB of free disk space dedicatedly for the VM. General Info: Publisher : NotSoSecure Language : English Updated : 2022 Duration : 5h+ Course Source : https://notsosecure.com/security-training/advanced-web-hacking [hide] magnet:?xt=urn:btih:33B07E61F9510025361EB75DB0042259FB823970&dn=NotSoSecure+%7C+Advanced+Web+Hacking+%5BFCO%5D&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.jordan.im%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexplodie.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2780%2Fannounce&tr=udp%3A%2F%2Ffe.dealclub.de%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2900%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2720%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Fopentracker.i2p.rocks%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fcoppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.zer0day.to%3A1337%2Fannounce [/hide]
-
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling pdf - 2019 videoz - 2018 R: https://www.sans.org/cyber-security-courses/hacker-techniques-incident-handling/ R-flyer : https://www.sans.org/brochure/course/hacker-techniques-incident-handling/3765 [hide] https://mega.nz/file/0nYTwKLa xzKakNentPPNm4qzpHncQUJ1T6GqBspM47yFjlsKyko [/hide] Enjoy !
- 23 replies
-
- 151
-
SEC511 - Continuous Monitoring and Security Operations pdf2019vid2019 Focus Area : Cyber Defense R : https://www.sans.org/cyber-security-courses/continuous-monitoring-security-operations/ [hide] https://mega.nz/file/42xnlDzS AVW6OkADJCPPtdmcfAWFp3xv-ab3GzWIholqlKsicME [/hide] Enjoy
- 27 replies
-
- 163
-
Free Download [OFFER] Cloud Security and Audit Fundamentals - AWS, Microsoft Azure, and Google Cloud Released 11/2023 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Skill Level: Beginner | Genre: eLearning | Language: English + srt | Duration: 2h 27m | Size: 347 MB Are you interested in learning more about the cloud, but not sure where to begin? This beginner-level skills development course equips you with baseline technical know-how on implementing basic security techniques in cloud computing, specifically in AWS, Microsoft Azure and Google Cloud. Join instructor Michael Ratemo for a comprehensive overview of the key elements of the cloud, how to secure each of these three cloud platforms, and how to evaluate the effectiveness of your security processes and protocols as you go. Michael covers auditing considerations for identity and access management, security in cloud virtual machines, virtual networks, cloud security in storage, and more. By the end of this course, you'll also be prepared to start leveraging cloud-native security posture management (CSPM) tools including AWS Security Hub, Microsoft Defender for Cloud, and Google Security Command Center. Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live [hide] No Password - Links are Interchangeable
-
Free Download [OFFER] ITProTV - Certified Information Security Manager (CISM) Last updated 1/2024 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English + srt | Duration: 13h 49m | Size: 5 GB Certified Information Security Manager (CISM) certification is the pinnacle for individuals aspiring to excel in Information Security Management. This course empowers you to showcase your expertise in security practices and validates your knowledge in this critical domain. In this comprehensive course, embark on a journey through four key sections: Information Security Governance, Risk Management, Information Security Program Development, and Incident Management. Uncover essential strategies, frameworks, and techniques encompassing governance principles, risk assessment methodologies, security program construction, and incident handling practices. Explore how to integrate security requirements seamlessly into IT operations, align strategies with business objectives, and effectively manage and mitigate incidents. Understanding these domains isn't just about passing the CISM exam; it's about gaining expertise to excel in today's cybersecurity landscape. Delve into regulatory impacts, risk assessment methodologies, security policy development, and incident response strategies. Equip yourself to align security programs with business objectives, analyze emerging threats, and navigate incident categorization and post-incident reviews. What you will learn Integrate governance principles into operations effectively Manage security risks using robust assessment methodologies Implement incident management aligned with regulations Identify and categorize incidents for prompt resolution Create essential policies for organizational resilience Ace post-incident reviews for continuous improvement Audience This course is tailored for aspiring or current information security professionals aiming to pursue the Certified Information Security Manager (CISM) certification. Prerequisites for this course include a basic understanding of information security concepts and familiarity with IT governance frameworks. Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live [hide] No Password - Links are Interchangeable
-
CCIE Practice Labs from C1sco or via CLN - The new CCIE Practice labs let you explore fully functional, hands-on lab environments in four-hour sessions. see more info
- 10 replies
-
- 135
-
Free Download [OFFER] Comprehensive Security Course (CSC) Published 1/2024 Created by Lazaro (Laz) Diaz MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 18 Lectures ( 6h 33m ) | Size: 5.45 GB Security for Server, Networking Devices & Security Concepts What you'll learn: They will learn the basics of how networks are structured, common vulnerabilities and the principles of securing a network They will learn about different types of networking devices and how to properly secure them. They will learn the importance of firewalls in a perimeter network They will learn how to configure ACL at different layers of your Network. Requirements: A basic understanding of Networking. Description: Introduction to the Course- "Through this course, we will give you a comprehensive introduction to Network Security. Indeed, we will explain the technical concepts; the level will therefore be accessible to everyone. If you already have computer prerequisites, this will undoubtedly be useful, but it is not mandatory."Starting with the Basics- "In the first learning section, we will speak on the security professional, threats to cyber security, types of security attacks, and physical security."Mitigation Techniques"Next, we will discuss several topics on how we can mitigate attacks through the use of ACLs, VACLs, and also a variation of Named ACLs as well as look into securing WLAN networks."Dive into Microsoft Server and Active Directory- "Through the final section, we will briefly look into the Microsoft server, specifically the active directory to centralize the login, and security for all user accounts and end devices."- "Understanding active directories when working in a Microsoft environment is crucial to the company. Within an active directory not only can you harden user accounts through the use of GPOs and file sharing permissions, but also an array of many other security enhancements that AD provides, such as CAs, group permissions, and creating least privileged policies."Conclusion and Key Takeaways- "In conclusion, this course will give you a lot of technical and conceptual information for you to be able to secure a network with at least the minimum guidelines. When it comes to security, you must use a layered approach and add some sort of security from top to bottom." Who this course is for: This course is for individuals looking to enter network or security engineering positions. Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live [hide] No Password - Links are Interchangeable
- 2 replies
-
- 11
-
- OFFER
- Comprehensive
-
(and 3 more)
Tagged with: