Content from Howard Poston
-
Learning path
Introduction to Applied Cryptography and Cryptanalysis
This learning path discusses applied cryptography and cryptanalysis. The fundamentals of cryptography are introduced as well as common applications of cryptography. The path also introduces weak algorithms used by malware, how to identify them and methods for deobfuscating the data.
Learn More
-
Learning path
Cyber Threat Hunting Fundamentals
The content of the learning path is divided into Courses corresponding to the objectives of the Infosec Certified Cyber Threat Hunting Professional (CCTHP) exam. The Courses focus on the foundation topics within the domains. Each Course has streaming content for the designated topics.
Learn More
-
Learning path
Identity and Access Management
The Identity and Access Management (IAM) learning path provides an introduction to implementing an IAM system. It covers the basic concepts of IAM, information about designing and implementing an IAM system, IAM security considerations and IAM requirements for data protection and federal standards.
Learn More
-
Learning path
Python for Cybersecurity
Python is one of the most popular and widely-used programming languages in the world due to its high usability and large collection of libraries. This learning path provides an application-driven introduction to using Python for cybersecurity. Python can help to automate tasks across the cyberattack life cycle for both cyber attackers and defenders. This learning path demonstrates some of these applications and how Python can be used to make cybersecurity professionals more efficient and effective.
Learn More
-
Learning path
Advanced Python Scripting for Cybersecurity
Python is one of the most popular and widely-used programming languages in the world, due to its high usability and large collection of libraries. This learning path provides an application-driven introduction to using advanced Python features for offensive and defense cybersecurity. This path demonstrates how some of the advanced functionality in Python packages can be applied to cybersecurity and how to automate multi-stage attack chains and defensive operations using Python.
Learn More
-
Learning path
Blockchain Security
This learning path introduces blockchain security, including a description of how the blockchain works at each level of the blockchain ecosystem. Security discussions include everything from the fundamental cryptographic primitives to the nodes and networks that make up the blockchain ecosystem to the security of smart contracts.
Learn More
-
Learning path
Secure Coding Fundamentals
Most software vulnerabilities are caused by the same few development mistakes. This path describes these vulnerabilities and how to recognize them in code, demonstrates how they are exploited by attackers (including real-world case studies of vulnerable applications in production), and describes ways by which the vulnerabilities can be mitigated.
Learn More
-
Learning path
Network Traffic Analysis for Incident Response
Learn about the tools and techniques used for analyzing traffic passing over the network. This learning path covers identification and analysis of benign and malicious traffic, examples and case studies of extracting intelligence from traffic data, considerations when building a network monitoring program, and techniques for collecting and analyzing traffic data.
Learn More