Inhalt: Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course you can learn how to use Kali for advanced pen testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting. Learn how to use the basic toolset and extend Kali, integrating native exploits into the Metasploitable environment. Find out how to generate and maintain a variety of shells, including Python and C++, and discover how to collect and use credentials. Get an introduction to the online Hack The Box lab where you can practice your pen-testing skills. Instructor Malcolm Shore focuses on the advanced customization of exploits and achieving root access through a sustainable shell. He has designed the course to help the learner advance as a professional pen tester, and learn key objectives needed to pass the Offensive Security Certified Professional (OSCP) exam. The training will appeal to all ethical hackers and pen testers, as well as general IT professionals. Umfang: 02:22:01.00
Inhalt: Ransomware is a growing threat, and it's imperative that IT security professionals have the knowledge and skills needed to protect their networks and systems against these attacks. In this course, instructor Malcolm Shore provides an in-depth look at tools and techniques you can use to reverse engineer malware. He discusses how to use reverse engineering to better understand malware, and demonstrates how to approach static and dynamic malware analysis. To wrap up, he dives into a real-world example of ransomware- the devastating WannaCry malware-using this case study to help you better understand how malware functions. Umfang: 01:22:39.00
Inhalt: Protect your network from cyberattacks. In this course, Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyberattacks can take, as well as the two most common types of protection you can build into your system: antivirus protection and firewalls. Then, learn how to scan your network for suspicious files, detect intruders with Netcat, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to combat application-level threats and monitor packet-level activity on your network. Umfang: 02:27:27.00
Inhalt: In this course, instructor Malcolm Shore offers you a hands-on introduction to programming in both the 32 bit and 64 bit x86 assembler and shows how you can use it to access system functions through the Windows API. First, Malcolm shows you how to install and test the GoAsm assembler, the Easy Code IDE, and the x64 debugger. He explains how to build a complex data structure and how to manipulate constants, registers, and main memory. He shows you how to write and call subprograms and how to manipulate information as an array. Then Malcolm goes into the Windows API and how to use it. He describes how to run a system command from inside an assembler program, as well as how to code and use jump tables. Next, he steps you through how to use what you've learned to complete an enigmatic encryptor. After showing you how to resolve some security issues in the assembler, Malcolm concludes with several examples of how you can run assembly code from another language with assembler subprograms. Umfang: 03:04:20
Inhalt: You've secured your systems, trained your users, and fortified your network. Think you're ready to handle a cybersecurity threat? Penetration testing is one of the best ways to see if your security will hold. It puts testers in the role of attackers, looking for vulnerabilities in your networks, computers, applications, email, and users. This course provides an introduction to the key knowledge and skills to start a program of professional penetration testing at your organization. Cybersecurity expert Malcolm Shore reviews popular pen testing tools, as well as the Bash and Python scripting skills required to be able to acquire, modify, and re-use exploit code. He also provides a refresher on the Kali Linux penetration testing toolbox, approaches to web testing, and several important facets of exploit code. At the end of this course, you'll be prepared to take more advanced training and to pursue the popular Offensive Security Certified Professional (OSCP) certification. Umfang: 02:38:32
Inhalt: More and more companies are migrating their applications and infrastructure to the cloud, shifting operational aspects to service providers such as Microsoft and Amazon. However, cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and systems safe. In this course, Malcolm Shore outlines the major forms of cloud technology, its benefits and risks, and the cybersecurity standards and body of knowledge required to mitigate those risks. He introduces concepts such as software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) and the different deployment models available. He then reviews offerings from Microsoft Azure, Amazon Web Services, and Google Apps. Malcolm also shows the Security as a Service (SecaaS) capability of each platform, which can be used to identify unauthorized access and put cloud security defenses like encryption, logging, and monitoring into place. Umfang: 02:27:56
Inhalt: Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers. It includes over 400 pen-testing programs, and it is the primary tool used by ethical hackers. Using Kali Linux, certified ethical hackers can test networks on their organizations'' behalves, to see if they''re vulnerable to outside attacks. This course will give prospective ethical hackers a short overview of the tools in Kali Linux. Cybersecurity expert Malcolm Shore shows how to set up a virtual environment for testing, configure Kali Linux, and install toolsets for information gathering, vulnerability assessment, password and hash cracking, and target exploitation. Because businesses are connected, they are also exposed. Vulnerability testing helps organizations limit that exposure. This course will help you explore the careers, techniques, and tools behind ethical hacking-one of the most competitive and sought-after IT security skills. Umfang: 02:31:49.00
Inhalt: In the twenty-first century, no one doubts the importance of cybersecurity. Threat modeling is where it starts. Threat modeling is a framework for thinking about what can go wrong, and the foundation for everything a security professional does. This training course provides an overview of the traditional four-question framework for (1) defining what you're working on, (2) discovering what can go wrong, (3) deciding what to do about it, and (4) ensuring you've done the right things in the right ways for the systems you're delivering. Instructor Adam Shostack also reviews the STRIDE model for identifying six types of threats: spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege. Using a simple case study-a billing system for a media server that serves ads-Adam shows how to apply the principles and find security and privacy problems so the developer can include appropriate configurations and controls as part of the operational design and rollout. Umfang: 00:41:41.00
Inhalt: Threat modeling allows security pros and software developers to proactively address the inevitable-hackers trying to compromise a system-early on in a project's life cycle. In this course, Adam Shostack covers tampering, the second stage in the STRIDE threat modeling framework. Tampering can compromise the integrity of a variety of systems and tools, from debuggers to Iocal storage. Throughout this course, Adam describes how different tampering threats work, as well as what you can do about them. Learn how attackers can tamper with libraries, IoT devices, cloud services, and more. Umfang: 00:32:13.00
Inhalt: Threat modeling is a framework for thinking about what goes wrong. Security pros and software developers should learn to threat model early in their careers, because it shapes every system they build and defend. Spoofing, pretending to be someone or something you're not, is one of the key threats to systems. This course teaches you many of the ways in which spoofing happens, including spoofing of people, machines, file systems, and processes. As instructor Adam Shostack explains, spoofing entails many factors: what you know, who you are, where you are, who you know, and more. There's spoofing of people and spoofing of roles, spoofing of processes or file spaces on a system, and spoofing of machine, IP, name, and TLS identities. Learning how and where these attacks take place will help you excel in your career and deliver more secure products and services. Umfang: 00:55:24.00
Inhalt: Repudiation-the third stage in the STRIDE threat modeling framework-involves the acceptance or denial of responsibility. In the case of identity theft, repudiation comes into play when victims deny involvement with the charges racked up by the criminal. These threats impact all sorts of systems, and security professionals and developers need to understand how they work, and how they can ensure that their systems offer defenses that accurately indicate responsibility. In this installment of his Threat Modeling series, Adam Shostack takes a deep dive into the subject of repudiation. Using practical examples, Adam covers the issues of fraud, identity theft, attacks on logs, and repudiation in specific technologies such as blockchain and the cloud. Umfang: 00:25:38.00
Inhalt: STRIDE is a popular threat modeling framework that helps security pros and software developers think strategically about risk. This course addresses the I in STRIDE, which stands for information disclosure. You can learn how to preserve the confidentiality of the data, secrets, and other information you store, and the policies you need to put into place to share that information safely. Topics include classic models such as data at rest and data in motion as well as information disclosure in processes and information disclosure in certain technologies such as cloud, Internet of Things and mobile, and AI and machine learning. Expert Adam Shostack also reviews the side effects of computation, the physical effects of CPUs, and the defenses you can put into place at your organization to manage metadata, secrets, and other sensitive information. Umfang: 00:29:23
Inhalt: In this installment of Adam Shostack's Threat Modeling series covering the STRIDE threat modeling framework, Adam goes over the D and E parts of the framework: denial of service and elevation of privilege. For both threats, Adam digs deep into two main questions: "What can go wrong?" and "What are we going to do about it?" He details the many targets of denial-of-service attacks like storage, memory, CPU bandwidth, and budget, and how elevation of privilege exists in basically any running code. He then goes over structured methods for ensuring that your systems are resistant to the various types of DoS attacks and elevation-of-privilege attacks. These attacks affect all manner of systems, and having an understanding of how they work and how to combat them are essential parts of a comprehensive approach to cybersecurity. Umfang: 00:46:09
Inhalt: From your personal and professional life, to broader changes to the world at large, dealing with change can be challenging even in the best of times. Change may be inevitable, but within modern organizations, it often feels like the world is changing rapidly at the hands of unseen forces. In this course, business psychologist Erin Shrimpton provides you with tools to help you not only survive changes in your work life, but thrive in uncertain times. To help explain why change can be so challenging, Erin begins by discussing the common psychological responses it brings about. She then delves into techniques and strategies you can use to protect yourself-and even give yourself a boost-while navigating change in your workplace and beyond. Umfang: 00:28:37
Inhalt: As a manager, whether managing your team face to face or virtually, you need to achieve goals and drive results. If your team is disengaged and disconnected, achieving business goals is challenging. In this course, Ireland-based organizational psychologist Erin Shrimpton teaches you how to apply principles of coaching and organizational psychology to foster connection and engagement and help your team thrive and deliver in a virtual work environment. Erin starts by going over the key building blocks for leading a virtual team, then covers the best ways to engage with your team both as individuals and the team as a whole. Umfang: 00:41:12
Inhalt: So often, our measure of success comes from someone or somewhere else. Entrepreneurial thinking can help you define success on your own terms. In this course, organizational psychologist Erin Shrimpton shows how to adopt a mindset to find success and fulfillment at work. As Erin explains, entrepreneurial thinking isn't just for startups. Taking calculated risks, seeing opportunity in adversity, and acting decisively in a crisis are all routes to success for any employee. She shows the way entrepreneurs think, act, and thrive, and how to harness these skills to find success and fulfillment in what you do. Umfang: 00:48:19
Inhalt: Erin Shrimpton-business psychologist, coach, and expert in organizational behavior-helps you change the workplace experience on your team for the better. Erin first defines organizational culture and shows how you can put all of organizational culture into perspective to work on improving experiences. People are more likely to get behind change when they're the ones driving it. Erin teaches you about participatory action and how to start your culture change plan. Then, Erin walks you through a five-step plan designed to help you make culture changes that stick. Learn how to define a shared vision, analyze data to diagnose the aspects of culture you're trying to change, set up culture squads to create solutions to the issues you've identified, and more. Plus, Erin shares some thoughts on why culture change initiatives at the team level are such meaningful work. Umfang: 00:36:06
Inhalt: You can be successful at work while maintaining a calm, Zen-like approach to your daily decisions and routines. Meditation and mental exercises like visualization can help you manage stress and create the life you want. This audio course led by Scott Shute, head of the Mindfulness and Compassion program at LinkedIn, offers a practical and easy approach to meditation, including simple, short exercises that you can build into a regular practice-even in the minutes before a meeting. Learn the science underlying the brain-body connection and how adapting your posture and changing your position can help you relax. Explore different kinds of breathing exercises, and discover visualization and loving-kindness techniques to open your mind and your heart. Scott closes with some advice for making your practice stick and integrate meditation into a busy schedule. Umfang: 01:27:32.00
Inhalt: Mindfulness and compassion are ancient practices that, when combined, can easily and powerfully be applied in the workplace. More than meditation, a mindfulness practice helps you reduce the effects of stress and build better relationships. Compassion is an underlying force that helps create more engaged employees and more successful workplaces. In this course, join Scott Shute, head of the Mindfulness and Compassion programs at LinkedIn, as he shares essential tools and techniques that can help you better show up for yourself and others at work. Learn simple breathing techniques that can settle your body and mind. Cultivate self-awareness by learning how to observe your own thoughts. Get strategies for developing greater compassion for yourself and others. Plus, get tips for incorporating mindfulness and compassion practices into your weekly routine. Umfang: 01:04:26
Inhalt: Learn the architecture of the MVC framework by exploring the life cycle of an HTTP request as it travels through the ASP.NET MVC framework. This course educates developers about the major steps in the request life cycle, as well as how to extend and customize them when appropriate. Instead of focusing on MVC coding and how to build applications, this course dives into the relationships between the components that comprise the request pipeline. The inner workings of the MVC framework are discussed where applicable, such as controller factories, dependency resolvers, and result execution. Umfang: 02:15:19.00
Inhalt: Software security is an important consideration when designing and developing web applications. While security breaches and threats can have serious consequences, there are steps that software developers can take to keep their applications safe. In this course, explore techniques for securing and controlling access to your ASP.NET Core applications. Instructor Janan Siam covers how to implement authentication and authorization using both ASP.NET Core Identity framework and token authentication with IdentityServer. She discusses the most common types of attacks, and how to protect against them. In addition, Janan examines several strategies for protecting sensitive data in your applications, including encryption, the new Data Protection API, and Secure Sockets Layer (SSL). Umfang: 02:37:23.00
Inhalt: ASP.NET boasts frameworks you can leverage to build robust web applications. In this course, Janan Siam helps you get up and running with this mature framework from Microsoft. Janan explores the framework and IDE, as well as the tools you need to manage data, build RESTful services, and establish real-time web connections. Learn how to build web applications with ASP.NET MVC, create dynamic web content with ASP.NET Web Pages and Razor syntax, work with ASP.NET SignalR, and more. Umfang: 02:09:14.00
Inhalt: While the mentorship-apprenticeship model is as old as the trade guilds, one's ability to mentor plays a deeper role in today's complex business environment. Strategic mentorship, which emphasizes professional growth through the mentorship of others, is no longer an option, but an imperative for effective leadership. In this course, join Sanyin Siang-the executive director of the Fuqua/Coach K Center on Leadership & Ethics (COLE) at Duke University-as she explains how to become a strategic mentor in your organization. After highlighting the benefits and potential outcomes of strategic mentoring, Sanyin shares specific tactics for promoting your own personal growth as you develop talent within your organization. Umfang: 00:09:29.00
Inhalt: Employee expertise and imagination are your company's most powerful assets. And research has shown that a sense of psychological safety is the biggest predictor of revenue growth. So, how do you nurture a safe work environment that allows your workforce to unleash its true potential? In this course, learn how to go beyond diversity and inclusion to proactively help your employees feel like they belong. In a volatile, uncertain, complex, and ambiguous (VUCA) world, an overall sense of belonging is imperative for organizational success; discover opportunities and strategies to cultivate-and sustain-this feeling in your business. Learn how to build team trust and redirect competitive behavior, how to maintain belonging during employee onboarding and exits, and how to make belonging an organization-wide habit. Umfang: 00:31:28
Inhalt: En quelques chapitres sur Corel Painter 12, le formateur Pascal Sibertin vous présente les fondamentaux de ce logiciel de référence dans le domaine de l'art numérique. Corel Painter 12 possède un nombre incalculable d'outils qui vous permettront de créer et de produire des images professionnelles de très haute qualité, tout en empruntant le chemin le plus simple pour la réalisation de vos créations. Maîtrisez toutes les couleurs et les supports qui donneront une réelle richesse créative à toutes vos ?uvres, et ce sans être obligatoirement un dessinateur de premier ordre ! Umfang: 04:12:48.00
Programm Findus Internet-OPAC findus.pl V20.235/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 07.05.2024, 17:27 Uhr. 622 Zugriffe im Mai 2024. Insgesamt 510.852 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral