• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

  1. protectaccount

    IT & Software Cloud Architecture Foundations | Cybrary

    In this Cloud Architecture training, students learn the basics of cloud computing across three platforms – Amazon Web Services (AWS), Microsoft Azure, and Google Cloud. This class provides students with hands-on training and excellent instruction. Link: *** Hidden text: You do not have...
  2. protectaccount

    IT & Software Windows Forensics and Tools | Cybrary

    The Windows Forensics and Tools course focuses on building digital forensics knowledge of Microsoft Windows operating systems, as well as some compatible software or tools that can be used to obtain or process information in such systems. Link: *** Hidden text: You do not have sufficient rights...
  3. protectaccount

    IT & Software HIPAA Training | Cybrary

    This online HIPAA Training is designed to introduce students to the Health Insurance Portability and Accountability Act (HIPAA). HIPAA is a U.S. healthcare law that was first passed in 1996. In this course, we will cover what HIPAA is, why it is important, and the key takeaways your organization...
  4. protectaccount

    IT & Software Security Onion | Cybrary

    Security Onion is an open source Network Security Monitoring and log management Linux Distribution. In this course we will learn about the history, components, and architecture of the distro, and we will go over how to install and deploy single and multiple server architectures, as well as how...
  5. protectaccount

    IT & Software Insider Threats | Cybrary

    This insider threat training course provides review of the “insider threat”. Discussed will be subjects related to people, tools, technology, and processes employed to prevent, detect and respond to the insider attack. This course will enable a student to confidently discuss “insider threat”...
  6. protectaccount

    IT & Software Analyzing Attacks for Incident Handlers | Cybrary

    In Analyzing Attacks for Incident Handlers, David Biser explains memory analysis and how to use it to uncover information about a computer. He demonstrates this process of analyzing an attack using labs such as a Redline lab and a VM and Malware lab to conduct an analysis on a computer. Link...
  7. protectaccount

    IT & Software Networking Fundamentals for Security Practitioners | Cybrary

    In this course, you will learn the fundamentals of networking through the lens of a security practioner. More specifically, we will cover topics like network protocols, architecture, devices, and topology, which are vital for any entry level IT/Security professional. Link: *** Hidden text: You...
  8. protectaccount

    IT & Software Linux Fundamentals for Security Practitioners | Cybrary

    Linux Fundamentals for Security Practitioners provides an overview on how to properly configure a Linux OS to provide a secure computing environment for end users. We’ll cover a combination of materials, focusing on Linux architecture, permissions, commands, directories, and shells to achieve a...
  9. protectaccount

    IT & Software pfSense: Installing and Configuring the Firewall | Cybrary

    PfSense is a is a free commercial firewall solution that users are able to customize based on their organization’s needs to create a solution that is tailored to those needs. PfSense can repurpose an old computer into a fully featured router and firewall. Link: *** Hidden text: You do not have...
  10. protectaccount

    IT & Software IoT Security | Cybrary

    This IoT Security training is designed to help IT professionals strengthen their knowledge about the Internet of Things (IoT) and the security platforms related to it. You’ll also be able to identify the security, privacy and safety concerns related to the implementation of an IoT...
  11. protectaccount

    IT & Software CCDA (Cisco Certified Design Associate) | Cybrary

    In this course you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification. Course Description Wireless networks are designed and implemented for a wide array of functions: Internet access, data centers, organizational security...
  12. protectaccount

    IT & Software CCDA (Cisco Certified Design Associate) | Cybrary

    In this course you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification. Course Description Wireless networks are designed and implemented for a wide array of functions: Internet access, data centers, organizational security...
  13. protectaccount

    IT & Software Fundamentals of Risk Policies and Security Controls | Cybrary

    In this course, you’ll learn various controls that need to be put in place to ensure that CIA triad of security is maintained while running a business. With threat expanding with time and more advanced attacks and data breaches being discovered, it is important for organizations to have proper...
  14. protectaccount

    IT & Software Incident Response Recovery | Cybrary

    Incident Response Recovery covers the actual recovery process from an incident that was identified and managed. It goes over the proper documentation necessary after the incident is handled, the legal concerns associated with the incident, and the lessons learned. Link: *** Hidden text: You do...
  15. protectaccount

    IT & Software Online Reconnaissance | Cybrary

    In Online Reconnaissance, Ken Underhill goes over the gathering of data through reconnaissance-related labs, with a primary focus on open-source intelligence (OSINT). He walks you through a social media profile analysis lab and a whois lab to give you a hands-on overview of information...
  16. protectaccount

    IT & Software Threat Hunting with Windows Event Forwarding | Cybrary

    In this course we will learn about an approach to collect events from windows devices in both normal operations and when an intrusion is suspected. We will use Windows Event Forwarding (WEF) natively built into Windows for Incident detection while sharing our learnings and step-by- step...
  17. protectaccount

    IT & Software Secure Coding Fundamentals | Cybrary

    In Secure Coding Fundamentals, Ayokunle Olaniyi takes you through the best coding practices, which ensures that the application developed as a result stick to the CIA triad and are not riddled by the OWASP top 10. Various aspects of code security and risk assesments across the OWASP top 10 are...
  18. protectaccount

    IT & Software Intro to Powershell Scripting | Cybrary

    In this course, you will learn the fundamentals of Microsoft Powershell, which is a popular task automation and configuration management framework. In this course you will learn the basics of the tool, to get started scripting today! Link: *** Hidden text: You do not have sufficient rights to...
  19. protectaccount

    IT & Software Getting Started in Security Analytics with CyberEASY | Cybrary

    This course focuses on the current perspective of cybersecurity analytics contrasted with the emerging trends over threat hunting and threat intelligence. The course will show the role of CyberEASY on threat intelligence and threat hunting and how CyberEASY can help the organization to better...
  20. protectaccount

    IT & Software Endpoint Security Fundamentals | Cybrary

    This course is about basics in Endpoint Security. In it, you will learn why endpoint security today is of such importance and basic terminology used in this field. Also, you will learn about threats that are existing today related to endpoints and what solutions and tools exist on the market...
  21. protectaccount

    IT & Software CISO Competency – Discretion | Cybrary

    This is the fifth course in Ed Amoroso’s Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Discretion and Trust. The CISO must be able to exhibit and manage high levels of discretion and trust in dealing with sensitive information regarding threats...
  22. protectaccount

    IT & Software CISO Competency – Public Speaking | Cybrary

    This is the sixth course in Ed Amoroso’s Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Public Speaking. As a senior executive, the CISO must have the ability to speak confidently and effectively before groups ranging from large audiences to corporate boards...
  23. protectaccount

    IT & Software Wireless Network Fundamentals for Security Practitioners | Cybrary

    In this course, the instructor covers the basics about wireless protocols which includes LTE, Bluetooth, Z-Qave, and zigbee. The instructor also goes more in-depth with Aircrack-NG by discussing the tools used to test the wifi networks, explaining how to install the tools on various OS, and...
  24. protectaccount

    IT & Software Pentest Fundamentals: Scanning Networks | Cybrary

    In Pentest Fundamentals: Scanning Networks, we explain what scanning is and why its important for a security assessment or maintence. He also discusses NMAP and covers the various types of NMAP techniques to scan a target effectively. Hping, a cmd packet-crafting tool generally used as a network...
  25. protectaccount

    IT & Software Web Defense Fundamentals | Cybrary

    In this course, you will learn the fundamentals of Web Defense and Web Application security, with a focus on the Open Web Application Security Project OWASP Top 10 and how they approach the various vulnerabilities that can be found in said web applications. Link: *** Hidden text: You do not...
  26. protectaccount

    IT & Software Basic Evimetry Deadboot Forensic Acquisition: Wired and Local | Cybrary

    Course Description In this course we will do the more common practice of creating a forensic image on the local computer but managing the entire process across a CAT6 network from the Evimentry Windows Controller. We’ll also revisit writing our forensic images to “blessed” storage media...
  27. protectaccount

    IT & Software CISO Competency – Innovation | Cybrary

    Course Description Course Introduction The Role of Innovation CISO Innovation to Defend Dealing with Failure Case Study on Innovation Guest Interview (Invited): Phil Quade, CISO Fortinet Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  28. protectaccount

    IT & Software CISO Competency – Finance & Administration | Cybrary

    Course Description Role of Corporate Finance Importance of Competent Administration Predictive Planning and Dealing with Cuts Case Study on Finance and Administration Guest Speaker (invited): Bill O’Hern, SVP/CSO AT&T Link: *** Hidden text: You do not have sufficient rights to view the hidden...
  29. protectaccount

    IT & Software Courses CISO Competency – Security | Cybrary

    Course Description Expectations for CISO Security Expertise Translating Technology to Plain Speak Background, Education, and Training Issues Case Study on Cyber Security Expertise Guest Speaker: David Ortiz, CISO Bed Bath & Beyond Link: *** Hidden text: You do not have sufficient rights to view...
  30. protectaccount

    IT & Software Fortinet FortiWeb Cloud WAF-as-a-Service | Cybrary

    Course Description The course will walk students through setting up their Route 53 domain, setting up an EC2 instance, and creating their Web application. Students will use a custom script (provided in the resources section of the course) to complete their EC2 instance setup. A simple web page...
  31. protectaccount

    IT & Software Intro to Docker | Cybrary

    Course Description This Docker training course will cover the basics of docker for a person with little to no prior knowledge of Docker. It will start from things like setting up Docker on Linux and Windows platforms. Overview Welcome to Intro to Docker. We will discuss what a container is...
  32. protectaccount

    IT & Software Cybersecurity Audit Overview | Cybrary

    Course Goals By the end of this course, students should be able to: Know the purpose of a cybersecurity audit Define cybersecurity audit controls Identify cybersecurity audit frameworks Explain proper audit team performance Define the benefits of a cybersecurity audit In this Cyber security...
  33. protectaccount

    IT & Software Command Line Basics | Cybrary

    Course Description Have you been curious about how others can use the command line to save countless hours of work? Are you overwhelmed with the text that runs across the screen, and have no idea where to begin? In this course you will learn command line and will start your journey to become...
  34. protectaccount

    IT & Software Intro to Cyber Threat Intelligence | Cybrary

    Course Description In its core, this course will explain what approaches and frameworks are available to implement a Cyber Threat Intelligence unit and how they can be used in it, and at the end you will have the necessary resources to be able to implement a Cyber Threat Intelligence unit...
  35. protectaccount

    IT & Software Mobile Malware Analysis Fundamentals | Cybrary

    Course Description The course will be divided into 6 modules, 2 labs and 2 case studies which will cover the mobile malware landscape, mobile architectures, static and dynamic analysis techniques and building your mobile analysis lab. Course Goals By the end of this course, students should be...
  36. protectaccount

    IT & Software Scanning, Enumeration, and Vulnerabilities | Cybrary

    Course Description Attackers use scanning and enumeration to determine what live systems are on the network (host discovery) and additional information about those systems, like the operating system in use and software version. With vulnerability scanning, an attacker attempts to locate...
  37. protectaccount

    IT & Software Certified Information Systems Security Professional (CISSP) | Cybrary

    Course Description CISSP certification verifies one has mastery of a multitude of information assurance and cyber security topics, something that’s necessary for IT management and leadership (a job that many CISSP holders fulfill). Our online CISSP training covers topics ranging from operations...
  38. protectaccount

    IT & Software Executive RMF | Cybrary

    Course Description While managing risk, the RMF framework can also help an organization to select appropriate security controls, to balance security and functionality for a safe and seamless end-user experience. The framework is made up of six steps, system categorization, selection of...
  39. protectaccount

    IT & Software OWASP | Cybrary

    Course Description This course will cover the OWASP Top 10 (2017). The OWASP (Open Web Application Security Project) foundation was formed back in the early 2000?s to support the OWASP project. The main goal is to improve application security by providing an open community, where organizations...
  40. protectaccount

    IT & Software Azure ARM | Cybrary

    Course Description Azure ARM goes into detail about ARM templates, their components, how to generalize the templates as well as how to use linked templates. It also covers the deployment automation using PowerShell, Azure CLI, and Azure DevOps. Course Goals By the end of this course, students...
  41. protectaccount

    IT & Software Advanced Cyber Threat Intelligence | Cybrary

    Course Description Cyber threats keep getting more complex and sophisticated and security teams cannot continue playing whack-a-mole. Basic methods and tools are no longer efficient against these emerging threats. This is why moving towards more data driven security is a necessity and of...
  42. protectaccount

    IT & Software CISO Security Controls: Endpoint Controls | Cybrary

    Course Description Dr. Amoroso provides an overview of Anti-Malware Tools, Endpoint Security, Hardware and Embedded Security, Industrial Control System (ICS) and Internet of Things (IoT) Security, Mainframe Security, Mobile Security, Password and Privilege Management, Multi-Factor...
  43. protectaccount

    IT & Software CISO Security Controls: Governance Controls | Cybrary

    Course Descriptionçç Dr. Amoroso provides an overview of Digital Risk Management, Bug Bounty Support, Cyber Insurance, Governance, Risk, and Compliance (GRC) and Risk Management, Incident Response, Penetration Test and Simulation, Security Analysis and SOC Hunt Tools, Security Information and...
  44. protectaccount

    IT & Software CISO Security Controls: Industry Controls | Cybrary

    Course Description Dr. Amoroso provides an overview of Industry Analysis, Information Assurance, Managed Security Services, Security Consulting, Security Career Support, Security Research and Development, Security Training and Awareness, and Security Valued Added Reseller (VAR) Solution...
  45. protectaccount

    IT & Software CISO Competency – Compliance | Cybrary

    Course Description Role of Compliance for Security Dealing with Frameworks Strategies for GRC Case Study on Compliance Guest Speaker: Stan Quintana, Former AT&T Executive and Current TAG Cyber Executive Vice President Link: *** Hidden text: You do not have sufficient rights to view the hidden...
  46. protectaccount

    IT & Software CISO Competency – Risk | Cybrary

    Course Description Role of Risk for the CISO Mapping Cyber Risk to Business Risk Prioritizing Security Based on Risk Case Study on Cyber Risk Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient...
  47. protectaccount

    IT & Software CISO Competency – Leadership | Cybrary

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. protectaccount

    IT & Software Basic Evimetry Deadboot Forensic Acquisition: Wireless Network | Cybrary

    Course Description This course provides intermediary knowledge of Excel and teaches advanced calculations in Excel, creating macros, and data analysis on various data sets. Course Goals By the end of the course, students should be able to: ❏ Use arrays in functions and formulas ❏ Know how...
  49. protectaccount

    IT & Software CISO Security Controls: Enterprise Controls | Cybrary

    Course Description Dr. Amoroso provides an overview of Intrusion Detection Prevention Systems (IDPS) and Deception, Data Leakage Prevention (DLP) and User Entity Behavioral Analytics (UEBA), Firewall Platform, Network Access Control, Unified Threat Management, Web Application Firewall, Web...
  50. protectaccount

    IT & Software CISO Competency – Productivity | Cybrary

    Course Description Role of Personal Productivity Day in the Life of the CISO Dealing with Time Management Case Study on CISO Personal Productivity Guest Speaker: Mike Stango Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden...
Top Bottom