PluralSight – Kubernetes Security-minimizing Microservice Vulnerabilities

PluralSight – Kubernetes Security-minimizing Microservice Vulnerabilities Bookware-KNiSO
English | Size: 165.95 MB
Category: Tutorial


Microservices are secured via both code and infrastructure. This course will teach you how to secure microservices hosted within a Kubernetes environment

PluralSight – Attacks Threats and Vulnerabilities for CompTIA Security Plus

PluralSight – Attacks Threats and Vulnerabilities for CompTIA Security Plus Bookware-KNiSO
English | Size: 434.25 MB
Category: Tutorial


In this course, you ll learn about the various threats faced by social engineering techniques like phishing, pharming, and identity fraud. First, you ll learn about potential indicators of compromise used to determine the types of attack to systems, applications, and networks. Next, you ll discover the various intelligence sources used to identify and combat these threats. Finally, you ll become familiar with various penetration testing tools and techniques. When you re finished with this course, you ll have the skills and knowledge needed to pass the Threats, Attacks, and Vulnerabilities section of Security+, along with the skills needed to help protect your company from attacks both internal and external

Apress – SQL Injection Attacks Protect Your System From Vulnerabilities

Apress – SQL Injection Attacks Protect Your System From Vulnerabilities-iLLiTERATE
English | Size: 259.22 MB
Category: Tutorial


Explore a preview version of SQL Injection Attacks: Protect Your System from Vulnerabilities right now.
This video takes you through everything you need to understand SQL injection and how to prepare for attacks as well as how to prevent them. It covers vulnerable website links, basic injection attacks, database and table name discovery, and data extraction. It’s everything an ethical hacker needs to know about a SQL injection attack.