Suchen

Suchen und Finden in der Gemeindebücherei Grassau

bis
Die Suche ergab 31 Treffer (0,47 Sek.).
Seite 1 von 1
Bild Beschreibung Standort Medium
Shore, Malcolm
Cybersecurity for IT Professionals
LinkedIn , 2019 - 02:27:27.00

Protect your network from cyberattacks. In this course, Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows ...
 

eLearning

online
Shore, Malcolm
Cybersecurity Foundations
LinkedIn , 2020 - 01:59:57.00

Set a rock-solid foundation for your network, users, and data by learning about the basics of cybersecurity. Security expert Malcolm Shore describes how to assess and mitigate risks using various c...
 

eLearning

online
Shore, Malcolm
Cybersecurity with Cloud Computing
LinkedIn , 2015 - 02:25:30.00

How do you keep your organization's files, applications, and accounts safe on the cloud? It starts with a considered design approach. In these videos, Malcolm Shore outlines the major cloud securit...
 

eLearning

online
Shore, Malcolm
Cybersecurity with Cloud Computing
LinkedIn , 2020 - 02:27:56

More and more companies are migrating their applications and infrastructure to the cloud, shifting operational aspects to service providers such as Microsoft and Amazon. However, cloud computing is...
 

eLearning

online
Shore, Malcolm
Ethical Hacking: Denial of Service
LinkedIn , 2019 - 01:33:46.00

Ethical hacking involves testing to see if an organization's network is vulnerable to outside threats. Denial-of-service (DoS) attacks are one of the biggest threats out there. Being able to mitiga...
 

eLearning

online
Shore, Malcolm
Ethical Hacking: Enumeration
LinkedIn , 2016 - 01:57:10.00

Ethical hacking is one of the most desired stills for any IT security professional. White hat hackers can detect, prevent, and mitigate network intrusions and data theft: a critical liability for a...
 

eLearning

online
Shore, Malcolm
Ethical Hacking: Enumeration
LinkedIn , 2021 - 02:04:02

Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targets and in optimizing their penetration testing. In this course, instructor Malcolm Shore teaches...
 

eLearning

online
Shore, Malcolm
Ethical Hacking: Evading IDS, Firewalls, and Honeypots
LinkedIn , 2019 - 01:59:41.00

Ethical hacking-testing to see if an organization's network is vulnerable to outside attacks-is a desired skill for many IT security professionals. In this course, cybersecurity expert Malcolm Shor...
 

eLearning

online
Shore, Malcolm
Ethical Hacking: Hacking Web Servers and Web Applications
LinkedIn , 2019 - 01:25:26.00

Websites and web applications are-by their very nature-accessible remotely, which puts them at high risk of cyberattacks. Knowing how to detect and prevent web attacks is a critical skill for devel...
 

eLearning

online
Shore, Malcolm
Ethical Hacking: Mobile Devices and Platforms
LinkedIn , 2016 - 01:52:18.00

Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique set of vulnerabilities, which hackers are all too willing to exploit....
 

eLearning

online
Shore, Malcolm
Ethical Hacking: Session Hijacking
LinkedIn , 2016 - 01:12:08.00

One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions-the valid interactions of unsuspecting users-in order to gain unauthori...
 

eLearning

online
Shore, Malcolm
Ethical Hacking: The Complete Malware Analysis Process
LinkedIn , 2019 - 01:32:24.00

The key to effectively protecting your systems is understanding the attacks you have to defend them against. This course introduces the different types of malware (malicious software) that can be u...
 

eLearning

online
Shore, Malcolm
Ethical Hacking: Wireless Networks
LinkedIn , 2016 - 01:41:36.00

Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security prof...
 

eLearning

online
Shore, Malcolm
Learning Assembly Language
LinkedIn , 2021 - 03:04:20

In this course, instructor Malcolm Shore offers you a hands-on introduction to programming in both the 32 bit and 64 bit x86 assembler and shows how you can use it to access system functions throug...
 

eLearning

online
Shore, Malcolm
Learning Kali Linux
LinkedIn , 2016 - 02:31:49.00

Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers. It includes over 400 pen-testing programs, and it is the primary tool used by ethical hackers. U...
 

eLearning

online
Shore, Malcolm
Learning Kali Linux
LinkedIn , 2020 - 01:43:57

Kali Linux is targeted at digital forensics experts and penetration testers. It includes over 400 pen-testing programs, and it is the primary tool used by ethical hackers. Using Kali Linux, you can...
 

eLearning

online
Shore, Malcolm
Migrating COBOL Apps
LinkedIn , 2020 - 02:48:21

Despite the arrival of myriad new and modern languages, COBOL still rules many government and legacy computing systems. Many of these systems are due to be retired, and the organization's applicati...
 

eLearning

online
Shore, Malcolm
Penetration Testing: Advanced Enumeration
LinkedIn , 2018 - 01:39:19.00

Enumeration is the key to achieving success with penetration testing, and learning how to do it effectively can be challenging. Whether you're preparing for the Offensive Security Certified Profess...
 

eLearning

online
Shore, Malcolm
Penetration Testing: Advanced Kali Linux
LinkedIn , 2018 - 02:22:01.00

Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course you can learn how to use Ka...
 

eLearning

online
Shore, Malcolm
Penetration Testing: Advanced Tunneling and Exfiltration
LinkedIn , 2018 - 01:15:41.00

Bolster your penetration testing skillset by learning three advanced techniques: tunneling, pivoting, and exfiltration. In this installment of the Penetration Testing series, instructor Malcolm Sho...
 

eLearning

online
Shore, Malcolm
Penetration Testing: Advanced Web Testing
LinkedIn , 2018 - 02:35:16.00

Websites are one of the most vulnerable pieces of technology since their contents are exposed on the internet. By understanding how attackers locate and exploit these vulnerabilities, you can help ...
 

eLearning

online
Shore, Malcolm
Penetration Testing Essential Training
LinkedIn , 2017 - 02:29:22.00

You've secured your systems, you've trained your users, and you've fortified your network. Think you're ready to handle a cybersecurity threat? Penetration testing is one of the best ways to see if...
 

eLearning

online
Shore, Malcolm
Penetration Testing Essential Training
LinkedIn , 2021 - 02:38:32

You've secured your systems, trained your users, and fortified your network. Think you're ready to handle a cybersecurity threat? Penetration testing is one of the best ways to see if your security...
 

eLearning

online
Shore, Malcolm
Python: Pen Testing AWS
LinkedIn , 2021 - 01:49:21

Pen testing is a standard technique for on-site systems, but the way testing is carried out in the cloud is different. This course explores the different types of vulnerabilities in the cloud, the ...
 

eLearning

online
Shore, Malcolm
Ransomware: Practical Reverse Engineering
LinkedIn , 2017 - 01:22:39.00

Ransomware is a growing threat, and it's imperative that IT security professionals have the knowledge and skills needed to protect their networks and systems against these attacks. In this course, ...
 

eLearning

online
Shore, Malcolm
Rapid Application Development with Python
LinkedIn , 2020 - 02:06:37

Developing graphical user interfaces (GUIs) in Python traditionally involves a lot of manual coding. wxGlade, a GUI designer written in Python for the wxPython GUI toolkit, was designed to help sim...
 

eLearning

online
Shore, Malcolm
Securing Android Apps
LinkedIn , 2017 - 01:44:12.00

Securing or "hardening" Android apps is an important final step to ensure code, keys, and credentials, as well as the developer's intellectual property, are well protected. This course provides an ...
 

eLearning

online
Shore, Malcolm
Securing the IoT: Designing and Testing
LinkedIn , 2017 - 02:50:08.00

It is estimated that by 2020, there will be 20 billion IoT devices worldwide. Designing security around these devices is crucial. In this course, Malcolm discusses what some of the security concern...
 

eLearning

online
Shore, Malcolm
Securing the IoT: Secure Architectures
LinkedIn , 2017 - 02:05:01.00

IoT is one of the biggest new developments in IT, with growth expected to reach billions of devices in the short term. There is, however, a major gap in understanding of security for IoT. Many firs...
 

eLearning

online
Shore, Malcolm
Understanding Zero Trust
LinkedIn , 2021 - 00:52:02

The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsiders worked effectively for years, but it's no longer a viable option in today's world. Workers work...
 

eLearning

online
Shore, Malcolm
Using SABSA to Architect Cloud Security
LinkedIn , 2021 - 01:11:11

The security required for cloud deployments is quite different from the security applied to on-site infrastructure. In order to ensure the most effective cloud security, cloud deployments should be...
 

eLearning

online

In meinem Konto anmelden.



In meinem Konto anmelden.