OWASP Top 10 Web Application Security Risks for ASP.NET

OWASP Top 10 Web Application Security Risks for ASP.NET
English | Size: 2.08 GB
Category: CBTs


Introduction
Who’s getting hacked?
Who’s doing the hacking?
OWASP and the Top 10
Applying security in depth
Injection [Read more…]

Wireless Hacking and Security Course

Wireless Hacking and Security Course
English | Size: 689.52 MB
Category: CBTs


This VTC course delivers an in-depth look at wireless security, demonstrating how IEEE 802.11 wireless attacks are carried out and defended against. Veteran instructor Bobby Rogers first provides a foundation in wireless security technologies before he proceeds with practical demonstrations on securing both clients and network devices. He also demonstrates how to monitor wireless networks, capture wireless traffic, and even crack WEP and WPA keys [Read more…]

Mastering IT Security

Mastering IT Security
English | Size: 0.99 GB
Category: CBTs


The three most important responsibilities of an IT professional are security, security, and security. This master class in IT security, produced by an expert who has spent the last 20 years securing computer and networks for the military and Fortune 500 clients, teaches the essential skills needed to secure PCs, servers, networks, mobile devices, and more. [Read more…]

Mastering Application Security

Mastering Application Security
English | Size: 938.33 MB
Category: CBTs


Writing code without taking security into account is a form of developer malpractice. But to write secure code, you first have to understand authentication, authorization, cryptography, and other tenets of security, as well as threats and countermeasures. In this series, security expert Ilya Pogrebensky takes you deep into secure coding practices and equips you with the knowledge you need to avoid becoming a headline. [Read more…]

iCollege – CompTIA Security+ SY0-401-Udemy

iCollege – CompTIA Security+ SY0-401-Udemy
English | Size: 1.24 GB
Category: CBTs


CompTIA’s Security+ is a vendor-neutral certification that validates the competency of security professionals working in the IT industry. The Security Plus Certification confirms a technician’s critical knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. Because human error is the number one cause for a network security breach, CompTIA Security+ is recognized by the technology community as a valuable credential that proves competency with information security.
[Read more…]

Lynda – Learning Cryptography and Network Security

Lynda – Learning Cryptography and Network Security
English | Size: 457.78 MB
Category: Tutorial


Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and provides a demonstration of a typical SSL transaction. By the end of this course, you’ll have a solid understanding of what it takes to move and store data securely. [Read more…]

Lynda – Learning Computer Security Investigation and Response

Lynda – Learning Computer Security Investigation and Response
English | Size: 273.02 MB
Category: Tutorial


Cybersecurity is a growing area of IT. Qualified computer forensics techs are in demand. But even if you aren’t a forensics specialist, it can be useful to know how to collect evidence of harassment, hacking, and identity theft on your own computer or mobile phone.
[Read more…]

Lynda – IT Security Foundations – Network Security

Lynda – IT Security Foundations – Network Security
English | Size: 273.40 MB
Category: CBTs


Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization’s network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building’s perimeter and the hardware within.
[Read more…]

Career Academy Certified Information Systems Security Officer CISSO Series

Career Academy Certified Information Systems Security Officer CISSO Series
English | Size: 2.94 GB
Category: Tutorial


This series covers everything you need to know about becoming a Certified Information Systems Security Officer. Students will learn about risk management, security management, authentication, access control, security models, operations security, symmetric cryptography and hashing, asymmetric cryptography and PKI, network connections, network protocols and devices, telephony, VPNs and wireless, security architecture, software development security, database security and system development, business continuity, disaster recovery, incident management, law, and ethics, and physical security.
[Read more…]

Career Academy – Certified Information Systems Security Officer CISSO Series TUTORIAL

Career Academy – Certified Information Systems Security Officer CISSO Series TUTORIAL
English | Size: 2.94 GB
Category: CBTs


Membership Benefits include Free Unlimited Access to All Project Management, Business Skills, IT Service Management, IT Networking and Cyber Security Online Training Series and more. Become a Member Today!
Training Series Overview
This series covers everything you need to know about becoming a Certified Information Systems Security Officer. Students will learn about risk management, security management, authentication, access control, security models, operations security, symmetric cryptography and hashing, asymmetric cryptography and PKI, network connections, network protocols and devices, telephony, VPNs and wireless, security architecture, software development security, database security and system development, business continuity, disaster recovery, incident management, law, and ethics, and physical security.
[Read more…]