SkillShare – The Complete Guide to Building a NIST Information Security Program-SkilledHares
English | Size: 2.00 GB
Category: Tutorial
Security
Manning – Angular Security and Deployment (Angular for Java Developers – Part 5)
Manning – Angular Security and Deployment Angular for Java Developers Part 5-iLLiTERATE
English | Size: 268.60 MB
Category: Tutorial
Angular for Java Developers Part Five: Security and Deployment teaches you how to put an Angular frontend into production, ready for real users.
[Update Links] PluralSight – Configuring Juniper Security Services
PluralSight – Configuring Juniper Security Services Bookware-KNiSO
English | Size: 201.84 MB
Category: Tutorial
Juniper is one of the main networking and security vendors and the knowledge of their product and solution offerings can be an advantage when coming into many modern working environments. In this course, Configuring Juniper Security Services, along with the two other accompanying courses focuses on the features used by the Juniper Connected Security approach. First, you will learn about the Intrusion detection and prevention feature that allows the SRX to monitor traffic for specific attack signatures and suspicious behavior. Then, you will explore the integrated user firewall feature and how it can be used to integrate identity within security policy. Next, you will discover several unified threat management features including anti-virus, web filtering, anti-spam, and content filtering. Finally, you will gain an understanding of Juniper’s Sky advanced threat prevention feature and how it can be used to manage persistent threats. By the end of this course, you’ll have a firm base of understanding of the basics of Juniper connected security
[Update Links] REST API Security-Basic Auth, JWT, OAuth 2.0, OIDC, MFA,HMAC | Udemy
REST API Security-Basic Auth, JWT, OAuth 2.0, OIDC, MFA,HMAC | Udemy
English | Size: 5.41 GB
Category: Tutorial
What you’ll learn
Lots of theoretical concepts about REST API Security
Lots of hands-on coding for implementing REST API Security
How to secure the transport layer using TLS
PluralSight – Security Event Triage-analyzing Live System Process And Files
PluralSight – Security Event Triage-analyzing Live System Process And Files Bookware-KNiSO
English | Size: 210.68 MB
Category: Security
Traditional forensic analysis on endpoints is outpaced by modern attack techniques. This course will teach you how to efficiently identify and investigate malicious activity by performing live system analysis on processes and files.