In this in-depth course, you’ll start by setting up your practice environment, gaining access to Burp Suite Community or Pro, and understanding how web applications function. You’ll explore key concepts like HTTP requests and responses, and understand how Burp Suite integrates into the process of web security testing. This foundational knowledge will set you up for success as … [Read more...] about Burp Suite Unfiltered – Go from a Beginner to Advanced
Security
Risk Identification, Monitoring, and Analysis
Course 3 - Risk Identification, Monitoring and Analysis This is the third course under the specialization SSCP In this course, we will explore how to manage the risks related to information systems. It is time to bring these ideas together in a context of continuous maturity modeling, measuring, and monitoring, which we will see is focused on the here and now. Risk alignment … [Read more...] about Risk Identification, Monitoring, and Analysis
Network and Communications Security
Course 5: Network and Communications Security Welcome to course five: network and communication security. As we know, the explosive growth in networks, connectivity, and communications has paved the way for unprecedented transformation of business, personal, and government services into electronic, web enabled forms. This growth in e-business and e-commerce greatly expanded … [Read more...] about Network and Communications Security
Incident Response and Recovery
Course 4 - Incident Response and Recovery This is the fourth course under the specialization SSCP In this course, we will focus on incident response and recovery. We will explore the incident life cycle as defined by NIST and continue with a deeper look at supporting forensic investigations. We will also extend these ideas and concepts around the theme of business continuity … [Read more...] about Incident Response and Recovery
Cryptography
Course 5 - Cryptography This is the fifth course under the specialization SSCP. In this course, we will explore the field of cryptography, including public-key infrastructures (PKIs), certificates, and digital signing. Here we enter the realm of confidentiality, integrity, and availability, since we use cryptography to protect data from unauthorized disclosure and improper … [Read more...] about Cryptography