PluralSight – Understanding the Java Virtual Machine Security UPDATED 2020/05/13

PluralSight – Understanding the Java Virtual Machine Security UPDATED 20200513-ELOHiM
English | Size: 143.98 MB
Category: Tutorial


Java security is built around the idea of permissions and policy. Code is granted permissions based on the currently in-force policy. In this course we look at how the security manager and access controller work hand-in-hand to provide this security. The course covers how to set a security manager and how to set up and edit a policy file to grant the levels of permissions that code needs. Permissions are typically based on where code is loaded from but we also look at how to sign code, so that permissions can be based on who created a library. The course also looks at how the AccessController walk the call stack to check that a permission can be granted. While the JRE comes with a set of permissions, these are not always enough so the class covers creating and using your own permissions. Finally we cover the idea of ‘privileged scope’ which allows code to be granted some permission even when code around them should cause the grant to fail

O’Reilly – From Zero to RHCSA 10 Weeks to Becoming RHCSA Certified

O’Reilly – From Zero to RHCSA: 10 Weeks to Becoming RHCSA Certified
English | Size: 970.97 MB
Category: Tutorial


Miscellaneous
Provider: O’Reilly
Title: From Zero to RHCSA: 10 Weeks to Becoming RHCSA Certified
Knowledge must be free. We are a 0day e-learning release group.
You can find us on Discord and pass some exams together. You will know when you found us.

PluralSight – Implementing The 20 CIS Critical Security Controls

PluralSight – Implementing The 20 CIS Critical Security Controls-REBAR
English | Size: 368.21 MB
Category: Tutorial


A question familiar to every information security professional is, “where do I start?” The CIS Controls get to the heart of the information security problem, putting security professionals in a position to make immediate and meaningful progress early in an information security program. In this course, Implementing the 20 CIS Critical Security Controls, you will find a practical framework to manage information security risks. First, you will learn about the history and purpose of the CIS controls. Next, you will learn about implementation groups to better understand the controls and sub-controls that make sense for your organization to implement. Finally, you will be equipped with 20 controls and over 170 sub-controls that can be customized to meet your organization’s unique security requirements. When you’re finished with this course, you will have the fundamental knowledge to address a majority of information security risks in your organization.

PluralSight – Securely Handling Errors And Logging Security Events In ASP NET And ASP NET Core

PluralSight – Securely Handling Errors And Logging Security Events In ASP NET And ASP NET Core-REBAR
English | Size: 210.97 MB
Category: Tutorial


Improper error handling and incomplete logging can have a crippling effect when it comes to the security of your ASP.NET and ASP.NET Core applications. In this course, Securely Handling Errors and Logging Security Events in ASP.NET and ASP.NET Core, you will gain the ability to properly shield and log errors gracefully, as well as effectively log security events. First, you will learn global exception handling and logging. Next, you will discover both what constitutes a security event and what information is important to log with them. Finally, you will explore how to analyze and explore the log entries you’ve created. When you’re finished with this course, you will have the skills and knowledge of Securely Handling Errors and Logging Security Events in ASP.NET and ASP.NET Core needed to solidify your own applications.