Courses
- Home
- All Courses
- Page 7
Threat and Vulnerability Management
Program Objectives Explain the importance of threat data and intelligence. Utilize threat intelligence to support organizational security. Perform vulnerability management activities. Analyze the output...
Monitoring and Managing Linux Processes
Topics Covered Security Policy Security Measures Securing Network Services Using a Firewall for Network Security Iptables Rules Monitoring and Logging Monitoring Activity in Real...
Kali Services
Topics Coved Configuring Network Managing User & Groups Configuring Services Managing Services
Kali Linux Command Line Fundamentals
Kali Linux Commands is an advanced penetration testing distribution by offensive security. It is available in 32-bit, 64-bit, and ARM flavors. Its features allow...