Mitre

Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh

Security Monitoring with Wazuh
by Rajneesh Gupta

English | 2024 | ISBN: 1837632154 | 323 pages | True/Retail PDF EPUB | 58.58 MB
Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh

Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh by Rajneesh Gupta, Santiago Bassett
English | April 12, 2024 | ISBN: 1837632154 | 322 pages | MOBI | 31 Mb
Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks

Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps by John Sotiropoulos
English | July 26, 2024 | ISBN: 1835087981 | 586 pages | EPUB | 27 Mb
Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh

Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh by Rajneesh Gupta, Santiago Bassett
English | April 12, 2024 | ISBN: 1837632154 | 322 pages | EPUB | 23 Mb

Qualys EDR: Endpoint Detection and Response for SOC Analysts  eBooks & eLearning

Posted by lucky_aut at July 14, 2025
Qualys EDR: Endpoint Detection and Response for SOC Analysts

Qualys EDR: Endpoint Detection and Response for SOC Analysts
Published 7/2025
Duration: 3h 8m | .MP4 1280x720 30 fps(r) x| AAC, 44100 Hz, 2ch | 1.36 GB
Genre: eLearning | Language: English

Qualys EDR for Cyber Security: Endpoint security, threat detection, agent deployment, incident response & threat hunting

Ai Agents For Cybersecurity 2025  eBooks & eLearning

Posted by ELK1nG at July 17, 2025
Ai Agents For Cybersecurity 2025

Ai Agents For Cybersecurity
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 857.63 MB | Duration: 1h 37m

Automating vulnerability detection, prioritization, and remediation with AI agents.

Cybersecurity: Vulnerability Assessment & Pen Testing (VAPT)  eBooks & eLearning

Posted by lucky_aut at Dec. 13, 2024
Cybersecurity: Vulnerability Assessment & Pen Testing (VAPT)

Cybersecurity: Vulnerability Assessment & Pen Testing (VAPT)
Published 12/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 89 Lectures ( 6h 7m ) | Size: 2.5 GB

Master Vulnerability Assessment and Penetration Testing (VAPT) with OWASP | Includes hands-on with virtual lab practical

Practical Threat Intelligence and Data-Driven Threat Hunting  eBooks & eLearning

Posted by TiranaDok at Dec. 9, 2024
Practical Threat Intelligence and Data-Driven Threat Hunting

Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK(TM) Framework and open source tools by Valentina Costa-Gazcón
English | February 12, 2021 | ISBN: 1838556370 | 398 pages | EPUB | 31 Mb

Evidence-Based Security  eBooks & eLearning

Posted by Free butterfly at Dec. 10, 2024
Evidence-Based Security

Evidence-Based Security by Christopher Frenz
English | 2023 | ISBN: 9781098148942 | MOBI | 0.77 Mb

Adversarial AI Attacks, Mitigations, and Defense Strategies  eBooks & eLearning

Posted by First1 at Dec. 2, 2024
Adversarial AI Attacks, Mitigations, and Defense Strategies

Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps by John Sotiropoulos
English | July 26th, 2024 | ISBN: 1835087981 | 586 pages | True PDF | 25.70 MB

Understand how adversarial attacks work against predictive and generative AI, and learn how to safeguard AI and LLM projects with practical examples leveraging OWASP, MITRE, and NIST