

Video Training → Hack The Box - Learn Cyber Security & Ethical Hacking in Fun
Published by: voska89 on 1-03-2023, 08:43 |
0

Free Download Hack The Box - Learn Cyber Security & Ethical Hacking in Fun
Published 3/2023
Created by Oak Academy
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 49 Lectures ( 2h 54m ) | Size: 1.61 GB
Video Training → Cyber Security 2023 Bundle Fundamentals Of Cybersecurity
Published by: voska89 on 26-02-2023, 13:44 |
0

Complete Cyber Security Bundle 2023 : Zero to Expert
Published 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.46 GB | Duration: 4h 31m
Video Training → The Cyber Security Series - Intermediate Cyber Security
Published by: voska89 on 26-02-2023, 01:19 |
0

Intermediate Cyber Security
Published 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.29 GB | Duration: 2h 29m
Video Training → OWASP Top 10 for Docker and Kubernetes Security
Published by: voska89 on 24-02-2023, 01:17 |
0

Protect your containers and Kubernetes deployments with OWASP's Top 10 security guidelines
Published 2/2023
Created by Enes Turan
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Video Training → Linkedin Learning - Cisco CCNP SCOR Security 350-701 1 Security Concepts and Network Security
Published by: Minhchick on 23-02-2023, 16:52 |
0

Linkedin Learning - Cisco CCNP SCOR Security 350-701 1 Security Concepts and Network Security
English | Tutorial | Size: 831.25 MB
The newest Cisco certification tracks each have one exam that serves as the core exam for that track's CCNP certification, and that same exam also serves as the written exam for that track's CCIE certification.
Video Training → Dynamic Application Security Testing
Published by: voska89 on 23-02-2023, 01:43 |
0

Building security testing into the software development lifecycle is the best way to protect your app and your end users. This course identifies tools and techniques that developers can use to minimize the cost and impact of security testing—while maximizing its impact and effectiveness. Instructor Jerod Brennen focuses on dynamic application security testing, using security scanning, penetration testing, and vulnerability testing to validate code and uncover vulnerabilities. He explains the difference between positive and negative, manual and automated, and production and nonproduction testing, so you can choose the right kind for your workflow. The hands-on sections—with demos of popular tools such as OWASP ZAP and Burp Suite—prepare you to apply the lessons in the real world.
Released 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Intermediate | Genre: eLearning | Language: English + srt | Duration: 3h 24m | Size: 464 MB
Video Training → Cyber Security Fundamentals One
Published by: voska89 on 23-02-2023, 01:41 |
0

Cyber Security Course For Beginners
Published 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 230.12 MB | Duration: 0h 43m
Video Training → Professional Security Officer Training
Published by: voska89 on 22-02-2023, 01:32 |
0

Published 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 558.69 MB | Duration: 1h 15m
Security Officer Skills for emergencies, legalities, technologies, health & safety, confrontations, and career success!
Video Training → Linkedin Learning - Cisco CCNP SCOR Security 350-701 3 Endpoint Protection and Secure Access
Published by: Minhchick on 21-02-2023, 16:26 |
0

Linkedin Learning - Cisco CCNP SCOR Security 350-701 3 Endpoint Protection and Secure Access
English | Tutorial | Size: 434.44 MB
In the final installment of the three-part series covering the Cisco CCNP SCOR Security (350-701) exam, instructor Charles Judd details the fifth and sixth domains of the exam: Endpoint Protection and Secure Access.
Video Training → Learn AKS network security
Published by: voska89 on 17-02-2023, 01:14 |
0

For an AKS cluster, there are two types of traffic. First one is the internal traffic between pods. The second one is the ingress and egress traffic that is between pods and the end users or the internet.This course provides the tools and techniques to secure these networks using tools like Network Policies with Calico, TLS certificates, etc.Microsoft provides the following recommendations to secure an AKS cluster and this course will try to go deeper with demonstration.Recommendation 1: To distribute HTTP or HTTPS traffic to your applications, use ingress resources and controllers. Compared to an Azure load balancer, ingress controllers provide extra features and can be managed as native Kubernetes resources.Recommendation 2: To scan incoming traffic for potential attacks, use a web application firewall (WAF) such as Barracuda WAF for Azure or Azure Application Gateway. These more advanced network resources can also route traffic beyond just HTTP and HTTPS connections or basic TLS termination.Recommendation 3: Use network policies to allow or deny traffic to pods. By default, all traffic is allowed between pods within a cluster. For improved security, define rules that limit pod communication.Recommendation 4: Don't expose remote connectivity to your AKS nodes. Create a bastion host, or jump box, in a management virtual network. Use the bastion host to securely route traffic into your AKS cluster to remote management tasks.
Published 2/2023
Created by Houssem Dellai
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch


