دوره‌های IT / Security

تعداد دوره‌ها: 190

Lynda - Blockchain: Beyond the Basics

Jonathan Reichental Security

Learn about blockchain technology and the implications of decentralized, encrypted data storage for business and society.

Get an introduction to the basics of data privacy: what it is, why it matters, and who it impacts, from consumers and private citizens to policymakers and C-suite business leaders.

Find out how to make IoT devices more secure by learning about the technologies and protocols used and how to implement countermeasures to address vulnerabilities.

Lynda - Security Tips Weekly

Scott Simpson Security

Want to broaden your knowledge of security? Get a new tip each week that can help you take steps to protect your information—no technical pedigree required.

Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.

Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.

Learn how to effectively create, provision, and operate a formal incident response capability within your organization to minimize the damage a cyberattack might cause.

Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.

Interested in finding an IT security job? IT security expert Marc Menninger explains how to launch a successful career in information security.

Lynda - Inside the Breach

Mike Chapple Security

Discover the inside story on headline-making, high-profile cybersecurity breaches, and find out how to protect your organization against similar attacks.

Learn how the dark web hides websites in plain sight. Explore why—and how—individuals use the Tor Browser to access content on this network of hidden sites.

Learn how cybersecurity best practices, policies, and processes can made your supply chain more secure.

Take a deep dive into the third and fourth categories of security vulnerabilities in the OWASP Top 10—sensitive data exposure and XML external entities (XXE).

Explore broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10.

Learn about the most important security concerns when developing websites, and what you can do to keep your servers, software, and data safe from harm.

Lynda - CISSP Cert Prep: The Basics

Mike Chapple Security

Get an overview of the 2018 CISSP certification program, including the eight exam domains.

Protect your networks from cyberattacks. Learn how to implement antivirus protection and firewalls and scan for suspicious activity.

Learn how you can create a policy-driven program to protect the social security numbers you have stored from unauthorized use.

Lynda - Network Forensics

Jungwoo Ryoo Security

Get a comprehensive, but succinct, look at network forensics. Learn how to prepare for network forensics investigations, investigate network events, and examine network traffic.

Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.