English | Size: 573.57 MB
Genre: eLearning
[Read more…]
Get Yourself a Better Life! Free eLearning Download
PluralSight – Best Practices And Lessons Learned From Securely Operating Microsoft Azure Stack-QUASAR
English | Size: 130.59 MB
Category: Tutorial
Microsoft Ignite 2019 | Best Practices and Lessons Learned from Securely Operating Microsoft Azure Stack | Daniel Savage
Join us to learn what it takes to successfully integrate, operate, service, and secure Azure Stack in your datacenter. [Read more…]
PluralSight – Hacking The Human-NOLEDGE
English | Size: 300.05 MB
Category: Tutorial
BSides Huntsville | Hacking the Human | Tracy Williams
Voluntary disclosure – Why there is no such thing as PII. People provide everything you need by just asking. Have a conversation, you just have to listen and look. Join Tracy Williams in this session to learn more. [Read more…]
PluralSight – Understanding the Java Virtual Machine Security UPDATED 20200513-ELOHiM
English | Size: 143.98 MB
Category: Tutorial
Java security is built around the idea of permissions and policy. Code is granted permissions based on the currently in-force policy. In this course we look at how the security manager and access controller work hand-in-hand to provide this security. The course covers how to set a security manager and how to set up and edit a policy file to grant the levels of permissions that code needs. Permissions are typically based on where code is loaded from but we also look at how to sign code, so that permissions can be based on who created a library. The course also looks at how the AccessController walk the call stack to check that a permission can be granted. While the JRE comes with a set of permissions, these are not always enough so the class covers creating and using your own permissions. Finally we cover the idea of ‘privileged scope’ which allows code to be granted some permission even when code around them should cause the grant to fail [Read more…]
O’Reilly – From Zero to RHCSA: 10 Weeks to Becoming RHCSA Certified
English | Size: 970.97 MB
Category: Tutorial
Miscellaneous
Provider: O’Reilly
Title: From Zero to RHCSA: 10 Weeks to Becoming RHCSA Certified
Knowledge must be free. We are a 0day e-learning release group.
You can find us on Discord and pass some exams together. You will know when you found us. [Read more…]
PluralSight – Implementing The 20 CIS Critical Security Controls-REBAR
English | Size: 368.21 MB
Category: Tutorial
A question familiar to every information security professional is, “where do I start?” The CIS Controls get to the heart of the information security problem, putting security professionals in a position to make immediate and meaningful progress early in an information security program. In this course, Implementing the 20 CIS Critical Security Controls, you will find a practical framework to manage information security risks. First, you will learn about the history and purpose of the CIS controls. Next, you will learn about implementation groups to better understand the controls and sub-controls that make sense for your organization to implement. Finally, you will be equipped with 20 controls and over 170 sub-controls that can be customized to meet your organization’s unique security requirements. When you’re finished with this course, you will have the fundamental knowledge to address a majority of information security risks in your organization. [Read more…]
SANS 642 PDF+USB 2017
English | Size: 4.2GB
Category: Tutorial
SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques [Read more…]
PluralSight – Securely Handling Errors And Logging Security Events In ASP NET And ASP NET Core-REBAR
English | Size: 210.97 MB
Category: Tutorial
Improper error handling and incomplete logging can have a crippling effect when it comes to the security of your ASP.NET and ASP.NET Core applications. In this course, Securely Handling Errors and Logging Security Events in ASP.NET and ASP.NET Core, you will gain the ability to properly shield and log errors gracefully, as well as effectively log security events. First, you will learn global exception handling and logging. Next, you will discover both what constitutes a security event and what information is important to log with them. Finally, you will explore how to analyze and explore the log entries you’ve created. When you’re finished with this course, you will have the skills and knowledge of Securely Handling Errors and Logging Security Events in ASP.NET and ASP.NET Core needed to solidify your own applications. [Read more…]