This course covers vulnerability management from an Executive Leadership level, and to help Executive Leadership understand the challenges of implementing a vulnerability management program, including ...
The OWASP Top 10 features the most critical web application security vulnerabilities. This part covers A02: Cryptographic Failures. You'll learn to identify, exploit, and offer remediation advice for ...
Develop your skills in the basic aspects of using and administering a device running Linux based operating systems. This lab features two Linux distributions: Ubuntu and CentOS. Dive into different ...
The OWASP Top 10 features the most critical web application security vulnerabilities. In this part, A04: Insecure Design, you'll take advice from a trusted offensive security professional on how to ...