[Applied Network Defense] YARA for Security Analysts

Applied Network Defense – YARA for Security Analysts [FCO] About Learn to use YARA to detect malware, triage compromised systems, and perform threat intelligence research. Detecting malicious elements within files is a core security skill for incident responders, SOC analysts, threat intelligence analysts, malware analysts, and detection engineers alike. There are different ways to accomplish […]

Mastering AWS Certified Solutions Architect Professional

Mastering AWS Certified Solutions Architect Professional [FCO]   AWS Architect Pro: Craft Robust Solutions with Advanced Design and Optimization Techniques, SAP-C02 Exam Prep and Tips.   Description IMPORTANT before enrolling:This course is not intended to replace studying any official vendor material for certification exams, is not endorsed by the certification vendor, and you will not […]

[O’REILLY] Mastering Security-Enhanced Linux (SELinux)

O’REILLY – Mastering Security-Enhanced Linux (SELinux) [FCO] About Everything youll ever need to know about SELinux! The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or […]

Intelligent Techniques For Cyber-Physical Systems [eBook]

Intelligent Techniques for Cyber-Physical Systems [eBook] [FCO] About Intelligent Techniques for Cyber-Physical Systems covers challenges, opportunities, and open research directions for cyber-physical systems (CPS). It focuses on the design and development of machine learning and metaheuristics-enabled methods as well as blockchain for various challenges like security, resource management, computation offloading, trust management, and others in […]

[PacktPub] Offensive Hacking Unfolded – Become A Pro Pentester [Video]

PacktPub – Offensive Hacking Unfolded – Become a Pro Pentester [Video] [FCO] About In this course, you will learn the very basics of installing VMware and what to do to create the virtual environment that contains both our hacker machine and the target labs. Learn how to do advanced information gathering and reconnaissance in both […]

Secure Data Mining [eBook]

Secure Data Mining [eBook] [FCO] About This era of information technology has a distinctive features of enormous amount of data being produced and stored by all forms human activities. Computers are used to store a huge portion of this database called computer databases, making the data accessible by the computer technology. However, enormous amount of […]

[CBTNuggets] Intro To IT Infrastructure Training

CBTNuggets – Intro To IT Infrastructure Training [FCO] About This foundational CompTIA IT Fundamentals training prepares learners to take the FCO-U61 exam, which is the one exam required to earn the IT Fundamentals certification. CompTIA’s ITF+ is a certification unlike almost anything else in the IT field. Originally designed to test aptitude in IT concepts, […]

[A Cloud Guru] Certified Information Systems Security Professional (CISSP)

A Cloud Guru – Certified Information Systems Security Professional (CISSP) [FCO] About Becoming a Certified Information Systems Security Professional (CISSP) will take your cyber security career to the next level. Learn to run a successful information security program. In-Detail Thank you for your interest in this course. Welcome to the Certified Information Systems Security Professional […]

[PacktPub] Pentesting Fundamentals For Beginners [Video]

PacktPub – Pentesting Fundamentals for Beginners [Video] [FCO] About Ethical hacking fundamentals do not change from one exam to the next. One can expect to see questions about Nmap, what commands were used to generate a specific output, and which tool would you use, regardless of the exam vendor. An individual is expected to know […]

[Alison] Diploma In Ethical Hacking | Network Vulnerabilities & Network Security

  Diploma In Ethical Hacking | Network Vulnerabilities & Network Security   Learn about ethical hacking network vulnerabilities, and network security in this free online course. This free online ethical hacking course can be of great help for people who have much interest in the field of networking and hacking – ethically. The course gives […]

[A Cloud Guru] Running Linux Servers On Google Cloud

A Cloud Guru – Running Linux Servers On Google Cloud [FCO] About This course explores the features and services required to configure, provision, and manage Linux servers on Google Cloud. About the course Welcome to the Running Linux Servers on Google Cloud course! In this course, you will learn about the different features and services […]

[Manning] Secret Key Cryptography

Manning – Secret Key Cryptography [FCO] About Video description Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods. In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: […]

[CBT Nuggets] Fundamental Data Security In The Cloud

CBT Nuggets – Fundamental Data Security In The Cloud [FCO]   Fundamental Data Security in the Cloud Online Training This intermediate Fundamental Data Security in the Cloud training prepares security professionals to provide a basic level of security to cloud data networks, whether hybrid or completely in the cloud. There are very few companies who […]

[O’REILLY] Fundamentals Of Secure Software

O’REILLY – Fundamentals Of Secure Software [FCO] In-Detail Application security describes security measures at the application level that aim to prevent data or code within the app from being stolen or hijacked. It may include hardware, software, and procedures that identify or minimize security vulnerabilities. Web application security is the process of securing websites, web […]

[A Cloud Guru] Running Linux Servers on AWS

A Cloud Guru – Running Linux Servers on AWS [FCO] This course introduces you to running Linux systems on the AWS platform.   About the course With a large part of the AWS cloud being built on Linux, it may not be all that surprising that a lot of the virtual machines that companies and […]

[CloudAcademy] Getting Started With Azure Cross-Platform CLI Automation

CloudAcademy – Getting Started With Azure Cross-Platform CLI Automation [FCO]   Description In this demonstration, we will take a look at the JSON output support in the Azure Cross-Platform (xPlat) CLI Tool. By emitting JSON from the Azure xPlat CLI Tool, we can use other JSON parsing tools, such as jsawk or jq, to filter, […]

[FireShip] Firebase Security Course

FireShip – Firebase Security Course [FCO] About Secure your Firebase app by mastering security rules In-Detail Firebase Security – The Full Course will teach you how to write, organize, and test Firestore security rules. The goal is to prepare developers for the safe and secure launch of a Firebase project. What Will I Learn – […]

[FireShip] React Supabase Full Course

FireShip – React Supabase Full Course [FCO] About Build and deploy a full-stack, production-ready web app with Supabase, React, and Postgres. In-Detail The Supabase Course is a project-based course that builds a Reddit-inspired web app from scratch with Supabase, PostgreSQL, and React. What will I learn? The goal of this course is to provide you […]

[SkillShare] VPS Mastery: Build Your Own PHP Web Server With Ubuntu

SkillShare – VPS Mastery: Build your own PHP web server with Ubuntu [FCO] About This Class Step by Step guide to setting up Ubuntu, Nginx and PHP on DigitalOcean VPS Teaching Your PHP Elephant to Swim in the Digital Ocean – Are you tired of poor hosting? – Do you want the latest version of […]

[CBT Nuggets] Certified Kubernetes Security Specialist (CKS)

CBT Nuggets – Certified Kubernetes Security Specialist (CKS) [FCO] About This intermediate Certified Kubernetes Security Specialist (CKS) training prepares DevOps professionals to minimize microservice vulnerabilities and set up and harden Kubernetes clusters. The world of IT has seen a big shift from using virtualized application deployment environments to containerized application deployment environments — and Kubernetes […]

[A Cloud Guru] AZ-900 Microsoft Azure Fundamentals

A Cloud Guru – AZ-900 Microsoft Azure Fundamentals [FCO] About Start your career in cloud computing with the AZ-900 Microsoft Azure Fundamentals certification. Discover and work with the different types of Azure tools and solutions available. About the course Update: This course has been updated to meet the November 9, 2020 changes to the AZ-900 […]

[CBT Nuggets] How To Automate Cisco Security Devices With Postman And Python

CBT Nuggets – How To Automate Cisco Security Devices With Postman And Python [FCO] Course overview This intermediate How to Automate Cisco Security Devices with Postman and Python training prepares network security admins to automate the behavior of their Cisco security devices and improve network security with Python code and APIs to other devices and […]

[EC-Council] Certified Ethical Hacker CEH v11 [2022]

EC-Council – Certified Ethical Hacker CEH v11 [2022] [FCO] About Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization. With the CEH v11 we’ve taken all that the CEH already is and added more to it, […]

[NotSoSecure] Advanced Web Hacking

NotSoSecure | Advanced Web Hacking [FCO]   This is our 5-day Advanced-level web application security testing course. Much like our popular Advanced Infrastructure Hacking class, this class talks about a wealth of hacking techniques to compromise web applications, APIs, cloud components and other associated end-points. This class focuses on specific areas of appsec and on […]

[Pluralsight] Kubernetes Administration – Learning Paths

Pluralsight – Kubernetes Administration – Learning Paths [FCO]   About This path focuses on the skills and knowledge required to become a fully functioning Kubernetes Administrator. You’ll begin with basic administration tasks and understanding the capabilities that the Kubernetes platform provides. You’ll cover each segment of knowledge needed to fully administer everything you’ll need as […]

[CBT Nuggets] Fortinet NSE 5 – FortiManager 7.x

  Description In this 74-video of 8 hours, intermediate-level training, CBT Nuggets trainer Keith Barker covers the knowledge security professionals need to maintain control of an entire network of Fortinet security devices with FortiManager – administering devices, rolling out configuration updates and installing configuration updates. Fortinet does more than manufacture security devices, they also provide […]

[O’REILLY] Threat Intelligence and Threat Hunting

  Video Description: 7+ hours of video training exploring key threat intelligence and threat hunting concepts   Overview: A cybersecurity professional needs to understand threats, threat actors, and have a clear understanding of where attackers are trying to take advantage of vulnerabilities. With more than 7 hours of video training, Threat Intelligence and Threat Hunting […]

[Investopedia Academy] Technical Analysis

  Description Learn basic and advanced technical analysis, chart reading skills, and the technical indicators you need to identify and capitalize on price trends of any tradable security in any market. – Over 75 lessons of video, exercises and interactive content – Extensive case studies and chart analysis   What will I learn? • Identify […]

[CBT Nuggets] CCNP Designing Enterprise Networks ENSLD

  Description: This intermediate Cisco CCNP Enterprise training prepares learners to take the 300-420 ENSLD exam, which is one of the concentration exams required to earn the CCNP Enterprise certification. Network design engineers deal with setting up and managing the performance and security of the organization’s networks. The design engineer specifies the equipment, software, and […]

[Cybrary] Advanced Penetration Testing

  About The Advanced Penetration Testing course teaches the cyber attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection.   Course Description “Those who continuously acquire new and better forms of […]