التخطي إلى المحتوى

Learning Paths

Detecting, Investigating and Tracking Malicious Infrastructure

Detecting, Investigating and Tracking Malicious Infrastructure

10 وحدات

This learning path shows how to analyze both phishing messages and the infrastructure they link to.

Detecting Malware

Detecting Malware

11 وحدات

This learning path covers intermediate-level knowledge and skills needed to detect and identify malware either from a given sample, or actively operating on a device on a variety of device platforms.

Analyzing Malware

Analyzing Malware

5 وحدات

This learning path will prepare you to start on the journey of analyzing malware. Note that this is one of the hardest areas of security to master, but incremental progress will give results. The general goal of malware analysis is to characterize new malware, both brand new malware and variants of existing ones.

Web Application Security Fundamentals

Web Application Security Fundamentals

6 وحدات

Dynamic web applications contain a huge amount of features but also many potential security flaws. This learning path teaches you about some common vulnerabilities within web applications, so you can be better able to detect and remedy them.

Web Application Security Assessment

Web Application Security Assessment

8 وحدات

This learning path will teach you how to scan your organizations' or beneficiaries' websites for potential vulnerabilities.

Web Application Hardening, Forensics, and Incident Response

Web Application Hardening, Forensics, and Incident Response

4 وحدات

This learning path looks at DoS attacks against websites, how to protect your or your beneficiaries' web applications from them, as well as how to collect and analyze website logs to detect attempted attacks.

Web Application Hardening, Forensics, and Incident Response

Web Application Hardening, Forensics, and Incident Response

0 وحدات

This learning path looks at DoS attacks against websites, how to protect your or your beneficiaries' web applications from them, as well as how to collect and analyze website logs to detect attempted attacks.