Bitcoin Vulnerabilities

Bitcoin Vulnerabilities
English | Size: 1.13 GB
Category: Tutorial


Ivan will show you how, despite having vulnerabilities, the Bitcoin Network stays secure.

PluralSight – Kubernetes Security-minimizing Microservice Vulnerabilities

PluralSight – Kubernetes Security-minimizing Microservice Vulnerabilities Bookware-KNiSO
English | Size: 165.95 MB
Category: Tutorial


Microservices are secured via both code and infrastructure. This course will teach you how to secure microservices hosted within a Kubernetes environment

PluralSight – Attacks Threats and Vulnerabilities for CompTIA Security Plus

PluralSight – Attacks Threats and Vulnerabilities for CompTIA Security Plus Bookware-KNiSO
English | Size: 434.25 MB
Category: Tutorial


In this course, you ll learn about the various threats faced by social engineering techniques like phishing, pharming, and identity fraud. First, you ll learn about potential indicators of compromise used to determine the types of attack to systems, applications, and networks. Next, you ll discover the various intelligence sources used to identify and combat these threats. Finally, you ll become familiar with various penetration testing tools and techniques. When you re finished with this course, you ll have the skills and knowledge needed to pass the Threats, Attacks, and Vulnerabilities section of Security+, along with the skills needed to help protect your company from attacks both internal and external

Apress – SQL Injection Attacks Protect Your System From Vulnerabilities

Apress – SQL Injection Attacks Protect Your System From Vulnerabilities-iLLiTERATE
English | Size: 259.22 MB
Category: Tutorial


Explore a preview version of SQL Injection Attacks: Protect Your System from Vulnerabilities right now.
This video takes you through everything you need to understand SQL injection and how to prepare for attacks as well as how to prevent them. It covers vulnerable website links, basic injection attacks, database and table name discovery, and data extraction. It’s everything an ethical hacker needs to know about a SQL injection attack.

PluralSight – Mitigating Security Vulnerabilities On Google Cloud Platform MAY2020

PluralSight – Mitigating Security Vulnerabilities On Google Cloud Platform MAY2020-REBAR
English | Size: 313.00 MB
Category: Tutorial


This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.