In this course, you will dive into the complexities of communication and network security, aligned with the latest CISSP curriculum. You will start by exploring key networking models such as the OSI and TCP/IP, understanding how different layers contribute to secure data transmission. Through examining network transmission media and transport technologies, you will learn how to … [Read more...] about Communication and Network Security
Computer Security and Networks
IT Risk Assessment Practices
This course begins by laying a strong foundation in risk identification and analysis. You'll explore the initial stages of the risk management lifecycle, focusing on pinpointing potential risk events and factors that could impact your organization. By delving into threat modeling and abuse-case modeling, you will gain a hands-on understanding of how to anticipate and mitigate … [Read more...] about IT Risk Assessment Practices
Writing Secure Code in ASP.NET
Unlock the potential of secure ASP.NET development with this course designed to arm you with essential skills for writing secure code. Begin your journey by setting up your environment and understanding the fundamental differences between .NET Core and .NET Framework. Progress to identifying and mitigating common vulnerabilities such as SQL injection, cross-site scripting … [Read more...] about Writing Secure Code in ASP.NET
Mastering Security Management with CDO
This course is designed for IT Security Administrators and Consultants. It is an intermediate course that dives deep into the management of security policies across different Cisco security solutions using CDO. The course will focus on technical topics like policy management, object management, and event logging. By the end of this course, you will be able to: - Operate the … [Read more...] about Mastering Security Management with CDO
Database Essentials and Vulnerabilities
The average cost of a data breach is nearly $5 million, with 70% of the affected organizations reporting significant or very significant disruption, according to an IBM report. Hence, businesses are hunting hard for cybersecurity experts who can safeguard against such threats. This course builds critical database security skills that employers are looking for. During the … [Read more...] about Database Essentials and Vulnerabilities