OffensiveLabs – Hacking and Securing Kubernetes Clusters

OffensiveLabs – Hacking and Securing Kubernetes Clusters
English | Size: 1.35 GB
Category: Tutorial


Kubernetes security, to some people is a complex subject because of the overwhelming jargon and the complex setup it requires to have a multi node cluster especially when you are doing it for the first time.

PluralSight – Cisco Core Security-securing The Cloud

PluralSight – Cisco Core Security-securing The Cloud Bookware-KNiSO
English | Size: 287.69 MB
Category: Tutorial


In this course, you’ll learn how to protect your organization’s cloud resources using Cisco products and overall cloud security fundamentals

Skillshare – Protect Your Digital Privacy Securing Your Computer-LiBRO

Skillshare – Protect Your Digital Privacy Securing Your Computer-LiBRO
English | Size: 365.53 MB
Category: Tutorial


You’ll use the provided checklist to document your progress as you move through the lessons. Because this class concerns privacy and security of your personal information, there won’t be a project that is displayed publicly

Udemy – Cybersecurity Basics Securing your life in the digital age

Udemy – Cybersecurity Basics: Securing your life in the digital age
English | Size: 684 MB
Category: Tutorial


Easy and actionable steps to protect you and your family from cyber threats
In this course, you will learn about actionable ways of protecting you and your family in the digital age. Technology and computers have permeated throughout our lives and it’s important to make sure we are armed with the right information to protect us from attackers and hackers. You do not need to be technical to go through this course. This course will cover basic fundamentals that anyone can implement quickly!

PluralSight – Securing Blazor Client side Applications

PluralSight – Securing Blazor Client side Applications Bookware-KNiSO
English | Size: 409.51 MB
Category: Tutorial


Explore how to secure your Blazor WebAssembly application using a variety of best practice techniques for authentication and authorization.