Old Search System: security banner




  • Dictionary of Information Security

    Dictionary of Information Security 256 pages | English | ISBN-10: 1597491152 | ISBN-13: 978-1597491150 https://www.amazon.com/dp/1597491152





  • IBM WebSphere Application Server v7.0 Security

    IBM WebSphere Application Server v7.0 Security 312 pages | English | ISBN-10: 1849681481 | ISBN-13:...





  • Oreilly - Introduction to Hadoop Security

    Oreilly - Introduction to Hadoop Security by Jeff Bean | Released March 2016 | ISBN:...


    In this Introduction to Hadoop Security training course, expert author Jeff Bean will teach you how to use Hadoop to secure big data clusters. This course is designed for users that are already familiar with the basics of Hadoop.You will start by learning about tooling, then jump into learning about...


  • Moodle Security

    Moodle Security 204 pages | English | ISBN-10: 1849512647 | ISBN-13: 978-1849512640 https://www.amazon.com/dp/1849512647





  • CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)

    CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA...





  • Army Forces for Homeland Security

    Army Forces for Homeland Security 100 pages | English | ISBN-10: 0833036734 | ISBN-13: 978-0833036735...





  • Ultimate ServiceNow Security Operations Course

    Ultimate ServiceNow Security Operations Course Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz,...


    What you'll learn
    ServiceNow Security Operations
    ServiceNow Security Incident
    ServiceNow Vulnerability Response
    ServiceNow Threat intelligence
    ServiceNow Security Operations Integrations
    Requirements
    Any ServiceNow instance
    Description
    Welcome to the Ultimate ServiceNow Security Operations course! Within this course you will learn how to use and begin to configure Vulnerability Response, Security Incident Response, and Threat Intelligence...


  • Security Awareness For Everyone

    Security Awareness For Everyone (Last Updated: 11/2020) https://www.udemy.com/course/security-awareness-for-everyone/ Learn to protect yourself and others from...


    What you'll learn Learn to protect yourself and others at work and home from trouble brought on by the digital age and enhanced by a global pandemic. Requirements None whatsoever! Description Why This Matters Looking closely at the digital forensics of many breaches, the acquired evidence often points to a...


  • Cryptography in Cyber Security with Python

    Cryptography in Cyber Security with Python Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100...


    What you'll learn
    cryptography
    cyber security
    confidentiality
    quantum computing
    crypto in python
    Requirements
    basic math
    general computing
    Description
    You can find basics of cryptography and learn Cryptographic Toolset implemented in Python.
    Symmetric and asymmetric algorithms,;
    AES,
    Salsa20,
    RSA,
    DH,
    ECDH,
    ECDSA
    Hash Functions:
    SHA-1,
    SHA-2,
    SHA-3
    MD5
    Message Authentication Codes (MAC, HMAC, CMAC)
    You can find answers...


  • McAfee Endpoint Security 10.7.0.926.6 Multilingual

    McAfee Endpoint Security 10.7.0.926.6 Multilingual | 291.7 MbOur new endpoint protection suites emphasize integration, automation,...



    The volume and sophistication of endpoint threats has steadily grown as adversaries target these often mobile and remote assets as initial attack footholds. Adding to the challenge, security teams, after years of bolting endpoint security point products together, are now managing an average of ten different agents and five different...


  • IT Security Gumbo: Exploitation with Kali

    [center]IT Security Gumbo: Exploitation with Kali (Last Updated: 10/2019) https://www.udemy.com/course/it-security-gumbo-exploitation-with-kali/


    Hands On Penetration Testing with Kali Linux[/center] What you'll learn Perform remote exploitation of systems Escalate local privileges to root level Utilize a variety of industry standard penetration testing tools within the Kali Linux distro


  • Ethical Hacking and Network Security Applied

    Ethical Hacking and Network Security Applied (Last Updated: 8/2020) https://www.udemy.com/course/ethical-hacking-and-network-security-applied/ Ethical Hacking Skills to Get...


    What you\'ll learn Practical Ethical Hacking and Penetration Testing Skills Learn How to set up a Hacking Lab (Kali Linux, Metasploitable, VMs). You will MASTER Ethical Hacking and Network Security Key Concepts (Reconnaissance, Sniffing, Exploitation ...). Acquire the Skills to MITIGATE ALL THE ATTACKS presented in the course. Learn How...


  • Spring Security Core: Beginner to Guru

    Spring Security Core: Beginner to Guru Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100...


    What you'll learn
    How to Secure Applications using Spring Security
    How to Protect Against Common Web Security Vulnerabilities (OWASP)
    Use Spring Security to Authenticate Application Users
    Use Spring Security to Authorize User Actions
    Password Management
    Best Practices for Limiting User Access
    Use Test Driven Development to Test User Access
    Requirements
    Must...


  • Learn Cyber Security 2020: Beginners Guide To Cyber Security

    Learn Cyber Security 2020: Beginners Guide To Cyber Security Video: .mp4 (1280x720, 30 fps(r)) |...



    What you'll learn
    What is Cyber Security.
    What are the Different Cyber Security Techniques.
    Different Types OF Hacker.
    Different types OF Cyber Attacks.
    What is Firewall and Its Types.
    What is Antivirus and Its working.
    Concept is Encryption
    Concept is Digital Signature.
    Concept of Authentication.
    Concept of Computer Forensic.
    What...


  • Social Security For Dummies, 4th Edition

    Social Security For Dummies, 4th EditionEnglish | October 9th, 2020 | ISBN: 1119689929 | 336...


    Claim the benefits you've earned
    The award-winning Social Security For Dummies—now in its fourth edition— is the one guide you need to navigate the often-complex world of Social Security benefits. You'll learn when to start claiming, how much you can expect to receive, where to find Social Security calculators, and more.
    ...


  • Configuration Management, Monitoring, & Security in DevOps

    Configuration Management, Monitoring, & Security in DevOps Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac,...


    What you'll learn
    Understand how the Agile Delivery Methodology helps you ensure accuracy and quality.
    Analyze branching strategies such as branch creation, merging, and synchronization.
    Learn to automate builds to deploy and deliver code faster and more often.
    Master the fundamentals of Docker, so that you can use containerization to...


  • Java Spring Boot Security-Authentication,Authorization

    Java Spring Boot Security-Authentication,Authorization Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch...


    What you\'ll learn
    How to Secure Java Web Applications
    How to use Spring Boot Security to secure REST API end points
    What is Authentication and Authorization
    Spring Boot Security - InMemory Authentication, JDBC Authentication
    Requirements
    Knowledge in Java, Spring Framework, Dependency Injection, Autowiring
    Description
    This Spring Boot Security Course covers, below Topics
    InMemory...


  • Introduction to Google Cloud Security Features

    Introduction to Google Cloud Security Features Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100...



    What you'll learn
    Student will learn about common GCP Cloud Security basics such as IAM
    Students will learn about how GSUITE and Google Cloud can integrate security
    Students will learn about GCDS and Cloud Identity
    Students will about service accounts
    Students will learn how to use App Engine and Compute...


  • Security Robots #3 66249

    Security Robots #3 66249TIF






  • Security Robots #1 66025

    Security Robots #1 66025TIF