PluralSight – Amazon Aurora Service Introduction

PluralSight – Amazon Aurora Service Introduction Bookware-KNiSO
English | Size: 45.05 MB
Category: Tutorial


Release Notes: This course introduces you to Amazon Aurora, the service that provides open-source database compatibility for AWS customers. This course introduces you to the service and its core features and capabilities

PluralSight – Protecting Sensitive Data From Exposure in ASP.NET and ASP.NET Core Applications

PluralSight – Protecting Sensitive Data From Exposure in ASP NET and ASP NET Core Applications Bookware-KNiSO
English | Size: 149.93 MB
Category: Tutorial


Unprotected sensitive data is one of the top vulnerabilities facing applications today. In this course, Protecting Sensitive Data From Exposure in ASP.NET and ASP.NET Core Applications, you’ll learn how to prevent attackers exploiting personal information, passwords, credit card numbers, or other sensitive data. First, you’ll learn how to classify your data, determining what is potentially sensitive. Next, you’ll discover the protection controls you need to consider when working with sensitive data. Finally you’ll explore how cryptographic and tokenization techniques can help keep this data safe while remaining usable. When you’re finished with this course, you’ll have the skills and knowledge needed to protect your system’s sensitive data from potential exposure

PluralSight – Cryptography Principles for IT Professionals and Developers

PluralSight – Cryptography Principles for IT Professionals and Developers Bookware-KNiSO
English | Size: 337.79 MB
Category: TUtorial


Cryptography is at the heart of all information security, from administering infrastructure to writing secure code. To be effective, you need to understand how cryptography works and how far it can be trusted. In this course, Cryptography Principles for IT Professionals and Developers, you will learn to apply cryptographic algorithms to keep your systems safe. First, you will learn the nature of information and see how that understanding directly informs the tools that you choose. Next, you will apply those tools to protect secrets documents, and systems under your control. Finally, you will explore how to create new tools by coding against cryptographic libraries in C# and Java. When you are finished with this course, you will have the skills and knowledge of cryptography needed to select and apply the correct algorithms to build a complete cryptosystem, and keep your users safe

PluralSight – Internet of Things IoT Executive Briefing

PluralSight – Internet of Things IoT Executive Briefing Bookware-KNiSO
English | Size: 308.63 MB
Category: Tutorial


Internet of Things (IoT) has been an increasing popular term over the last few years, whereas it seemed a sci-fi nerdy dream and great plot for a movie at first, it’s now everywhere around us and still growing. Chances are that it’s the best next step for your organization at this point to implement more IoT. In this course, Internet of Things (IoT): Executive Briefing, you ll learn to talk about IoT, and you ll know what the best steps are to implement IoT in your organization to keep up with or even get ahead of the competition. First you ll delve into what IoT is. Next, you ll explore the trends and characteristics in this field. Finally, you ll discover what to take into account when you have to deal with the IoT within your organization or personal life. When you re finished with this course, you ll have the skills and knowledge of IoT needed to understand its implications and the adoption processes of IoT applications

PluralSight – Metasploit Getting Started

PluralSight – Metasploit Getting Started Bookware-KNiSO
English | Size: 201.05 MB
Category: Tutorial


The Metasploit Framework is a very capable exploitation toolkit It is not an easy tool to quickly understand and utilize effectively. In this course, Metasploit: Getting Started you ll learn to use the Metasploit Framework to configure and launch exploits with payloads to compromise vulnerable target systems in a red team and penetration testing context. First you ll explore the Metasploit Framework architecture, which is key to understanding the framework s capabilities and inner workings. Next, you ll discover how to configure the Metasploit Framework for launching an attack. Finally, you ll learn how to use the Metasploit Framework s tools for post-exploitation activities once a system has been compromised. When you re finished with this course, you ll have the skills and knowledge of configuring and launching penetration tests needed to effectively use the Metasploit Framework