PluralSight – Managing Security In Google Cloud Platform

PluralSight – Managing Security In Google Cloud Platform-REBAR
English | Size: 404.48 MB
Category: Tutorial


This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.

Cloud Academy – Configuring GCP Access and Security

Cloud Academy – Configuring GCP Access and Security-STM
English | Size: 619.82 MB
Category: Tutorial


Security is considered to be one of the biggest challenges when comparing cloud vs. in-house infrastructure. Due to lack of trust, loss of control, and the multi-tenant nature of the cloud, security controls and mechanisms are of the utmost importance
Google Cloud Platform offers tools with a single dashboard and simple interfaces to implement security policies Google Cloud Identity and Access Management (IAM) provides an easy way to manage GCP users and the permissions assigned to them. Besides human users, GCP provides a way to create non-human identities (service accounts) and attach those to cloud applications and VMs. The correct configuration and usage of service accounts and IAM are critical to GCP security. GCP also provides a centralized dashboard to view audit logs, which are useful in the case of a security breach To help you get the most out of the security tools offered in Google Cloud, this course covers how to properly manage IAM, service accounts, and audit logs

A Cloud Guru – Practical Event-Driven Security with AWS

A Cloud Guru – Practical Event-Driven Security with AWS-SKiLLUP
English | Size: 834.82 MB
Category: Tutorial


Cloud applications are enabling businesses to move faster than ever, and with that comes a growing demand for security solutions that are able to keep up.

PluralSight – Analyzing Malware for NET and Java Binaries

PluralSight – Analyzing Malware for NET and Java Binaries-iNKiSO
English | Size: 278.26 MB
Category: Tutorial


The ability to quickly and effectively analyse a wide variety of malware is a critical skill for anyone performing incident response, working in a security operations center (SOC), or analyzing malware. In this course, Analyzing Malware for .NET and Java Binaries, you will gain the skills necessary to effectively analyze Java and .NET malware. First, you will learn how .NET and Java binaries differ from other malware. Next, you will learn the tools, techniques, and workflows necessary to reverse engineer these types of binaries. Finally, you will apply everything you learned through hands-on labs in which you will analyze real-world malware. When you are finished with this course, you will have the knowledge and skills necessary to analyze .NET and Java binaries, giving you the ability to effectively investigate a wider variety of malware