PluralSight – Performing Malware Analysis on Malicious Documents

PluralSight – Performing Malware Analysis on Malicious Documents-iNKiSO
English | Size: 415.40 MB
Category: Tutorial


Hiding malware within documents has become one the main methods attackers use to compromise systems. In this course, Performing Malware Analysis on Malicious Documents, you will learn how to look at documents to determine if they contain malware, and if so, what that malware does. First, you will explore how to analyze malicious Adobe PDF and Microsoft Office documents

PluralSight – Play by Play Modern Web Security Patterns

PluralSight – Play by Play Modern Web Security Patterns-iNKiSO
English | Size: 533.25 MB
Category: Tutorial


Play by Play is a series in which top technologists work through a problem in real time, unrehearsed, and unscripted. In this course, Play by Play: Modern Web Security Patterns, Troy Hunt and Lars Klint investigate current security web approaches and trends with real world examples, and then dive into how these incidents and errors can be fixed with easy to use techniques

PluralSight – Cryptography Fundamentals for Developers and Security Professionals

PluralSight – Cryptography Fundamentals for Developers and Security Professionals-iNKiSO
English | Size: 344.67 MB
Category: Tutorial


The Java and .NET frameworks contain all the algorithms you need to keep your users’ data secret from prying eyes. Web servers like Apache, Tomcat, and IIS, combined with tools like OpenSSL keep your users secure online. But to use these tools correctly and to avoid mistakes of the past, you must understand how cryptography works. Learn the math behind encryption and digital signatures. Study examples of how it has been misused, and explore the possibilities that cryptography enables in digital currency and collaboration

PluralSight – Getting Started Analyzing Malware Infections

PluralSight – Getting Started Analyzing Malware Infections-iNKiSO
English | Size: 191.66 MB
Category: Tutorial


Computer virus outbreaks are becoming more complex and use clever deployment tactics that trick people into getting infected, even without their knowledge. Traditional antivirus technologies have a hard time keeping up. There is a need for security analysts that are able to tackle these infections and stop them from infecting other computers. In this course Getting Started Analyzing Malware Infections, you’ll learn how to safely contain and analyze suspicious files and URLs. Next you learn to extract malicious scripts from documents deobfuscate them, and extract indicators that lead to other malware components. Finally, you will learn to investigate virus deployment techniques that bypass modern security controls. When you’re finished with this course, you will have the skills and the knowledge to build layered defenses that will disrupt the infection chain at multiple stages protecting your data and your company

PluralSight – Creating a Security-centric Culture-iNKiSO

PluralSight – Creating a Security-centric Culture-iNKiSO
English | Size: 552.84 MB
Category: Tutorial


In this thought leadership course, you will delve into some fundamental techniques that can be employed to make security the norm rather than the exception.