Cloud Infrastructure Analysis with Prowler
In this course, you will learn to perform AWS cloud security assessments using the tool Prowler, which is one of the first essential steps to continuous security in the cloud. ...
File Analysis with TruffleHog
In this course, you will learn to perform file analysis of source code repositories using the tool TruffleHog, which is one of the essential steps of continuous data loss detection and prevention ...
OS Analysis with Volatility
In this course, you will learn how to perform OS analysis of volatile memory using the tool volatility, the most advanced memory forensics framework. ...
Analyze Endpoint Data with Elasticsearch
The endpoint remains one of the primary targets for cyber threat actors. Endpoint monitoring and analysis is ever more critical to an organization, to protect its data and intellectual property. This course will teach you how to monitor and analyze endpo ...