Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing
The OWASP Zed Attack Proxy is an open source way of testing your web applications manually. This course walks through the basic functions of ZAP, giving you a look at ways this tool makes taking advantage of web application vulnerabilities possible.
You're Compromising Your Company's Security. Here's How.
Keeping your company secure is a top priority—and it starts with a strong strategy. Join cybersecurity expert Dale Meredith as he shares actionable advice for upgrading your security strategy and practices.
OS Analysis with RegRipper
RegRipper is an open-source application for extracting, correlating, and displaying specific information from Windows Registry hive files. In this course, you will learn to detect adversary activity on a Windows host using RegRipper.
Zero Trust Architecture: Executive Briefing
This course will teach you the basic understanding and applicability of zero trust.
Technical Information Gathering with Maltego CE
One of the most important phases in a red team engagement is the information gathering prior to the attack. In this course, we explore the Maltego CE tool, which will help you to collect technical and people information from your target.
5.18 - 5.24
Azure SQL Database: Diagnosing Performance Issues with DMVs
Importing Formatted Text Files: R Playbook
Financial Management: Automate Forecasting in Python
Summarizing and Organizing Data in Excel
Creating a Custom Function in R
5.25 - 5.31
ASP.NET Core Microservices: Getting Started