In this hands-on lab, you will learn the basics of Incident Response, including its role in a security program and major phases. You will practice using incident response tools on a live system to ...
This course covers vulnerability management from an Executive Leadership level, and to help Executive Leadership understand the challenges of implementing a vulnerability management program, including ...
In Incident Response Planning, David Biser describes the different aspects to consider when creating and implementing an incident response plan. These different aspects act as tools that help an ...
Sumo Logic is a cloud-native machine data analytics service that allows you to quickly identify and remediate security threats and compliance issues in the cloud and hybrid environments. Learn how to ...
The MSHTML Windows remote code execution vulnerability (CVE-2021-40444) identified in September 2021 could allow a threat actor to execute code on a victim’s machine. In this advanced course, you will ...
The OWASP Top 10 features the most critical web application security vulnerabilities. This part covers A03: Injection. You will learn how to identify, exploit, and offer remediation advice for this ...
Create a free account to start exploring the platform. The Axelos ITIL 4 Foundation examination represents the modern evolution of IT Service Management (ITSM), encapsulating the latest practices in ...