The following lessons explain different programming concepts and have been published by our members. Search for a particular lesson using the filters
cybersecurity
spain-national-security-framework
🏛️ Understanding the key components of the organizational and operational framework in Spain's National Security Scheme (ENS)
Read lessoncybersecurity
ISO 27001
ISMS
🔒 Understanding the framework and how to implement it for ISO 27001 certification. Conducting risk assessment and implementing controls.
Read lessoncybersecurity
dlp
data loss prevention
🛡️ Understanding the key aspects of regulatory compliance in data loss prevention (DLP) for GDPR, PCI-DSS e HIPAA. Implementing DLP controls and managing exceptions and false positives
Read lessoncybersecurity
dlp
data loss prevention
🛡️ Understanding the critical role of DLP in protecting sensitive information. Types of sensitive data and data leakage channels.
Read lessoncybersecurity
pentesting
red team
Mastering Windows Command Line for Remote System Control
Read lessoncybersecurity
pentesting
red team
Understanding Privilege Escalation: How Attackers Exploit Vulnerabilities to Gain Unauthorized Access
Read lessoncybersecurity
web security
penetration testing
Learn to identify and exploit Local File Inclusion (LFI) and Remote File Inclusion (RFI) vulnerabilities in web applications. Understand how attackers can access sensitive files, execute malicious code, and discover prevention techniques and key tools to strengthen your application's security.
Read lessoncybersecurity
spain-national-security-framework
🛡️ Understanding the key components of the implementation and security measures in Spain's National Security Scheme (ENS)
Read lessoncybersecurity
ISO 27001
ISMS
🔒 Understanding the certification process, audit preparation, common findings, and maintenance of certification
Read lessoncybersecurity
dlp
data loss prevention
🛡️ Understanding the key aspects of designing effective DLP policies, implementing DLP controls, and managing exceptions and false positives
Read lessoncybersecurity
pentesting
wazuh
Wazuh is an open-source security platform that provides unified XDR and SIEM protection for endpoints and cloud workloads. It offers threat prevention, detection, and response capabilities through its integrated modules.
Read lessoncybersecurity
pentesting
red team
Learn all about Buffer overflow and how to exploit this vulnerability
Read lessoncybersecurity
pentesting
owasp top 10
Understanding Cryptographic Failures: How to Identify and Prevent Them
Read lessoncybersecurity
databases
pentesting
Discover the Causes, Consequences, and Solutions of NoSQL Injection: A Comprehensive Guide to Preventing and Mitigating Vulnerabilities in NoSQL Databases
Read lessoncybersecurity
spain-national-security-framework
🛡️ Understanding the fundamentals of spain's National Security Scheme, its importance in information security management, and the certification process
Read lessoncybersecurity
ISO 27001
ISMS
🔒 Understanding the fundamentals of ISO 27001, its importance in information security management, and the certification process
Read lessoncybersecurity
dlp
data loss prevention
🛡️ Understanding the key strategies and technologies for Data Loss Prevention (DLP). Protecting data at rest, in motion and in use. Implementing DLP controls and integrating DLP into existing infrastructure.
Read lessoncybersecurity
penetration testing
blue-team
Explore the world of Endpoint Detection and Response (EDR) systems, focusing on advanced threat detection and real-time response to safeguard modern businesses. Learn how EDR provides proactive protection, using monitoring, machine learning, and automation to detect and address security risks efficiently.
Read lessoncybersecurity
pentesting
red team
How Attackers Use Vulnerabilities to Gain System Control and Perform Privilege Escalation Attack
Read lessoncybersecurity
pentesting
red team
Learn about Server-Side Request Forgery (SSRF), its impact on web security, and how to protect against this dangerous vulnerability. Includes real-world examples and prevention techniques.
Read lesson