This is a self-paced lab that takes place in the Google Cloud console. In this lab, you create an OU and learn how to configure security settings. … [Read more...] about Secure Devices and Users on ChromeOS
Computer Security and Networks
Web Application Security Testing with OWASP ZAP
By the end of this project, you will learn the fundamentals of how to use OWASP Zed Attack Proxy (ZAP). This tool greatly aids security professionals and penetration testers to discover vulnerabilities within web applications. You will learn how to perform a basic web app vulnerability scan, analyze the results, and generate a report of those results. This course includes steps … [Read more...] about Web Application Security Testing with OWASP ZAP
Secure Software Development
This comprehensive course on Secure Software Development is designed to help IT professionals integrate security at every stage of the Software Development Life Cycle (SDLC), following the CISSP curriculum. The course starts with an introduction to security considerations in software development and how to choose the appropriate development methodology, including process-driven … [Read more...] about Secure Software Development
Intermediate Ethical Hacking Techniques
Take your ethical hacking knowledge to the next level with this intermediate course designed for aspiring cybersecurity professionals. Begin with active information gathering and port scanning, where you'll master tools like Nmap and Zenmap, and learn techniques for bypassing firewalls and utilizing Nmap scripts. This comprehensive module ensures you have a robust understanding … [Read more...] about Intermediate Ethical Hacking Techniques
Getting Started with Linux Terminal
In this 1-hour long project-based course, you will learn how to use simple commands to create and manipulate files and folders, perform multiple complex tasks using one simple command, use the superuser to perform high privilege operations. … [Read more...] about Getting Started with Linux Terminal