If you’re on the offensive security path and want to enhance your skills in web application security against critical vulnerabilities, then this is the course for you. This web application security ...
Do you have a basic understanding of the Windows operating system, but want to learn more about digital forensics? This Windows Forensics and Tools course focuses on building digital forensics ...
The MSHTML Windows remote code execution vulnerability (CVE-2021-40444) identified in September 2021 could allow a threat actor to execute code on a victim’s machine. In this advanced course, you will ...
The Polkit vulnerability (CVE-2021-4034) is a critical vulnerability impacting every major Linux distribution. Its attack vector allows privilege escalation and can even give the attacker root access.
CVE-2022-26134 is an Object-Graph Navigation Language (OGNL) injection flaw impacting Atlassian Confluence & Data Center software. Leveraging this remote code injection (RCE) flaw, adversaries can ...
Prepare for your exam by taking this Splunk Enterprise Certified Administrator course taught by a Splunk Professional Services Consultant. Learn license management, configuration, monitoring, and how ...
Cybersecurity solution provider Check Pointt® walks you through how out to use their Maestro Hyperscale network security tool and prepares you for their exam, #156-412 at Person VUE. This Check Point ...
Interested in becoming a cyber defense analyst? You’ll need the insider threat training offered in this course. Learn how to better protect data, information, and networks from malicious insiders ...
This session focuses on building a skilled cybersecurity team. The benefits of developing your team’s skills are clear, but nearly 80% of IT and Security leaders say they don't yet have a way to ...
Hyper-V is a hypervisor that is able to establish VM's on x86-64 windows systems. This popular virtualization tool from Microsoft allows the user to run multiple operating systems on a server. Assess ...
The Redis vulnerability (CVE-2022-0543) is a critical flaw impacting Linux systems across the globe. By exploiting this vulnerability, any user can remotely execute commands as a root user on a system ...