Catalog Search Results
Author
Publisher
linkedin.com
Pub. Date
2020.
Language
English
Description
Learn how to quickly develop Python graphical user interface (GUI) apps using the wxPython library, which brings the wxWidgets capability to Python, and the wxGlade tool.
Developing graphical user interfaces (GUIs) in Python traditionally involves a lot of manual coding. wxGlade, a GUI designer written in Python for the wxPython GUI toolkit, was designed to help simplify this process. In this course, learn how to quickly develop Python GUI apps using...
Author
Publisher
linkedin.com
Pub. Date
2020.
Language
English
Description
Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.
Set a rock-solid foundation for your network, users, and data by learning about the basics of cybersecurity. Security expert Malcolm Shore describes how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST, COBIT 5, and...
Author
Publisher
linkedin.com
Pub. Date
2015.
Language
English
Description
Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Learn about risk and control frameworks, detecting malware threats, and more.
Set a rock solid foundation for your network, users, and data by learning about the basics of cybersecurity. Security expert Malcolm Shore shows how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST, COBIT 5, ISO 27000,...
Author
Publisher
linkedin.com
Pub. Date
2021.
Language
English
Description
Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.
Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targets and in optimizing their penetration testing. In this course, instructor Malcolm Shore teaches the basic methods of enumerating networks and targeting systems with common enumeration tools. Malcolm explains what enumeration...
Author
Publisher
linkedin.com
Pub. Date
2021.
Language
English
Description
Learn about the SQL command language and SQL injections. Examine SQL injections in MySQL, SQL Server, and Oracle XE, and discover how attackers defeat web application firewalls.
SQL injections are a common way to gain unauthorized access to web applications and extract data from them. In this course, instructor Malcolm Shore shows you the SQL command language and how it is used by attackers to craft SQL Injections. Malcolm begins with commonly encountered...
Author
Publisher
linkedin.com
Pub. Date
2021.
Language
English
Description
This course provides a hands-on introduction to programming in the x86 assembler and shows you how it can be used to access system functions through the Windows API.
In this course, instructor Malcolm Shore offers you a hands-on introduction to programming in both the 32 bit and 64 bit x86 assembler and shows how you can use it to access system functions through the Windows API. First, Malcolm shows you how to install and test the GoAsm assembler,...
Author
Publisher
linkedin.com
Pub. Date
2021.
Language
English
Description
Discover how to use Python to test your AWS deployments for vulnerabilities that are unique to the cloud.
Pen testing is a standard technique for on-site systems, but the way testing is carried out in the cloud is different. This course explores the different types of vulnerabilities in the cloud, the techniques used to test cloud deployments, and key open-source tools for testing Amazon Web Service deployments: CloudGoat, the AWS CLI, and the AWS...
Author
Publisher
linkedin.com
Pub. Date
2021.
Language
English
Description
Learn how you can use SABSA, a leading security architecture framework, to architect security into a business-driven cloud deployment.
The security required for cloud deployments is quite different from the security applied to on-site infrastructure. In order to ensure the most effective cloud security, cloud deployments should be properly architected. In this course, instructor Malcolm Shore shows how to do this using the SABSA enterprise security...
Author
Publisher
linkedin.com
Pub. Date
2018.
Language
English
Description
Take your pen testing skills to the next level. Learn how to locate and exploit website vulnerabilities with Burp Suite, sqlmap, DIRB, and more.
Websites are one of the most vulnerable pieces of technology, since their contents are exposed on the internet. By understanding how attackers locate and exploit these vulnerabilities, you can help build more secure websites and applications. This course shows you how to perform advanced web testing using...
Author
Publisher
linkedin.com
Pub. Date
2020.
Language
English
Description
Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.
More and more companies are migrating their applications and infrastructure to the cloud, shifting operational aspects to service providers such as Microsoft and Amazon. However, cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and systems...
Author
Publisher
linkedin.com
Pub. Date
2016.
Language
English
Description
Learn how to enumerate protocols, processes, and services on Windows and Linux machines, and study for the Certified Ethical Hacker exam.
Ethical hacking is one of the most desired stills for any IT security professional. White hat hackers can detect, prevent, and mitigate network intrusions and data theft: a critical liability for any company that does business online or in the cloud. This course introduces to the concept of enumeration—identifying...
Author
Publisher
linkedin.com
Pub. Date
2021.
Language
English
Description
Learn how to use Kali Linux for advanced penetration testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting.
Kali Linux is the penetration-testing professional's main tool, and includes hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course, Malcolm Shore teaches you advanced pen testing with Kali, including stealthy testing, privilege escalation, and pivoting....
Author
Publisher
linkedin.com
Pub. Date
2019.
Language
English
Description
Protect your networks from cyberattacks. Learn how to implement antivirus protection and firewalls and scan for suspicious activity.
Protect your network from cyberattacks. In this course, Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyberattacks can take, as well as the two most common types of protection you can build...
Author
Publisher
linkedin.com
Pub. Date
2022.
Language
English
Description
Explore the next phase of your career in ethical hacking with advanced techniques to safely enter and operate on more complex networks and systems.
Once you’re proficient with basic ethical hacking techniques, you may be wondering about your next play. Advanced skills in evasion become increasingly necessary when you’re entering and operating on more complex systems. In this course, instructor Malcolm Shore shows you techniques to become a savvier...
Author
Publisher
linkedin.com
Pub. Date
2019.
Language
English
Description
Find out about the protocols used to access websites, and how to test websites and web applications to prevent exploitation through cyberattacks.
Websites and web applications are—by their very nature—accessible remotely, which puts them at high risk of cyberattacks. Knowing how to detect and prevent web attacks is a critical skill for developers and information security professionals alike. In this course, find out about existing and emerging...
Author
Publisher
linkedin.com
Pub. Date
2018.
Language
English
Description
Bolster your penetration testing skillset by learning three advanced techniques: tunneling, pivoting, and exfiltration.
Bolster your penetration testing skillset by learning three advanced techniques: tunneling, pivoting, and exfiltration. In this installment of the Penetration Testing series, instructor Malcolm Shore helps you grasp the basics of these three techniques, detailing what they are and how to leverage them when doing pen testing or responding...
Author
Publisher
linkedin.com
Pub. Date
2022.
Language
English
Description
Learn the basics of cybersecurity and network testing through practical, hands-on demonstrations.
Learn how to protect your network from cyberattacks through practical, hands-on demonstrations. In this course, Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyberattacks can take, as well as the two most common types of...
Author
Publisher
linkedin.com
Pub. Date
2024.
Language
English
Description
Explore the tools you need to become a proficient ethical hacker: Kali Linux running in a VirtualBox environment, the Metasploitable system, and a Juice Shop website for testing.
For ethical hackers, from beginners through to the most experienced professionals, Kali Linux provides the most effective platform from which to run penetration tests. In this course, cybersecurity expert Malcolm Shore introduces you to the set of tools necessary for efficient...
Author
Publisher
linkedin.com
Pub. Date
2017.
Language
English
Description
Learn about security architecture for IoT, and its realization in the context of a medium to large-scale deployment of Internet of Things devices.
IoT is one of the biggest new developments in IT, with growth expected to reach billions of devices in the short term. There is, however, a major gap in understanding of security for IoT. Many first-wave IoT systems are showing significant security weaknesses, and security is often recognized as one of...
Author
Publisher
linkedin.com
Pub. Date
2016.
Language
English
Description
Find out how to test websites and web applications for weaknesses and prevent cyberattacks like SQL injections and cross-site scripting exploits.
Websites and web applications are—by their very nature—accessible remotely, which puts them at high risk of cyber attacks. Knowing how to detect and prevent web attacks is a critical skill for developers and information security professionals alike. Find out how to test your sites and applications for...
Interlibrary Loans
Didn't find what you need? Items not owned by Arcadia Public Library can be requested from other libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request