Security Training for Free by Erdal Ozkaya
This blog post is like an all-star security heaven.
It will help you to learn from the best in the in industry. It has all what you need to understand on what is going on today in the security industry. It will help you gain Security certifications again for FREE.
Certifications like EC Council Hacking Countermeasures or ISC’s CISSP, sessions from Mark Russinovich to Hasain Alshakarti, Marcus Murray to Paula, Andy, Raymond and of course my self.
Of course I could not fit all the legends in but, this is a good way to kick start your career or start protect your IT environment.
Enjoy
Courses from Charles Sturt University
Hacking Countermeasures | http://www.itmasters.edu.au/free-short-course-hacking-countermeasures/ |
Information Security Incident Handling | http://www.itmasters.edu.au/free-short-course-information-security-incident-handling/ |
Network Security Administrator Certification | http://www.itmasters.edu.au/free-short-course-network-security-administrator-certification/ |
CISSP Security Certification | http://www.itmasters.edu.au/free-short-course-cissp-security/ |
Cisco CCNA Security | http://www.itmasters.edu.au/free-short-course-cisco-ccna-security/ |
Cloud Models, Architecture, and Risk Management | http://www.itmasters.edu.au/free-short-course-cloud-models-architecture-and-risk-management-submission-confirmation/ |
Courses From Microsoft
Defense in Depth | http://www.microsoftvirtualacademy.com/training-courses/defense-in-depth-windows-8-1-security |
Security Fundamentals | http://www.microsoftvirtualacademy.com/training-courses/security-fundamentals |
What’s New in Windows 8.1 Security | http://www.microsoftvirtualacademy.com/training-courses/what-s-new-in-windows-8-1-security |
Securing Your DM Infrastructure with Role-Based Admin | http://www.microsoftvirtualacademy.com/training-courses/securing-your-dm-infrastructure-with-role-based-admin |
Recorded Conference sessions (Microsoft Tech Ed Sessions)
P0wn3d! What’s Next? | http://channel9.msdn.com/Events/TechEd/NorthAmerica/2013/WCA-B220#fbid= |
Why a Hacker Can Own Your Web Servers in a Day! | http://channel9.msdn.com/Events/TechEd/Europe/2014/DEV-B371 |
Hacker Tools for Ethical Hackers to Protect Windows Clients | http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/WIN-B351#fbid= |
Raiders of the Elevated Token: Understanding User Account Control and App Capabilities in Windows | http://channel9.msdn.com/Events/TechEd/NorthAmerica/2013/WCA-B335#fbid= |
Live Demonstration: Hacker Tools You Should Know and Worry about | http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/DCIM-B341#fbid= |
Learning the Basics of Penetration Testing! | http://channel9.msdn.com/Events/TechEd/NorthAmerica/2012/SIA304 |
Case of the Unexplained: Troubleshooting with Mark Russinovich | http://channel9.msdn.com/Events/TechEd/Europe/2014/WIN-B410 |
Malware Hunting with Mark Russinovich and the Sysinternals Tools | http://channel9.msdn.com/Events/TechEd/Europe/2014/CDP-B373 |
Public Cloud Security: Surviving in a Hostile Multi-Tenant Environment | http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/DCIM-B306#fbid= |
Pass-the-Hash: How Attackers Spread and How to Stop Them | http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/DCIM-B359#fbid= |
The Ultimate Hardening Guide: What to Do to Make Hackers Pick Someone Else | http://channel9.msdn.com/Events/TechEd/Europe/2014/CDP-B37 |
Hacker’s Perspective on Your Windows Infrastructure: Mandatory Check List | http://channel9.msdn.com/Events/TechEd/Europe/2014/CDP-B371 |
CSI: Windows – Techniques for Finding the Cause of Unexpected System Takeovers | http://channel9.msdn.com/Events/TechEd/Europe/2014/CDP-B370 |
Hackers (Not) Halted | http://channel9.msdn.com/Events/TechDays/Techdays-2014-the-Netherlands/Hackers-Not-Halted |
The Inside Man: Surviving the Ultimate Cyber Threa | http://channel9.msdn.com/Events/TechEd/NorthAmerica/2013/ATC-B314#fbid= |
The Dark Web Rises: A Journey through the Looking Glass! | http://channel9.msdn.com/Events/TechEd/Europe/2014/CDP-B376 |
A Game of Clouds: Black Belt Security for the Microsoft Cloud | http://channel9.msdn.com/Events/TechEd/Europe/2014/CDP-B305am |
Cloud Network Automation: DDI/IPAM | http://www.microsoftvirtualacademy.com/training-courses/cloud-network-automation-ddi-ipam |
Erdal Ozkaya – Microsoft Tech Ed Talks All |
http://channel9.msdn.com/Events/Speakers/Erdal-Ozkaya |
Bulletproofing Your Network Security | http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/WIN-B310#fbid= |
Windows 8.1: Black Belt Security | http://channel9.msdn.com/Events/TechEd/Europe/2014/WIN-B318 |
Windows To Go: Deployment, Support for BYOD, and What IT Pros Need to Know | http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/WIN-B314#fbid= |
Social Engineering: Manipulations, Targeted Attacks, and IT Security | http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/PCIT-B319#fbid= |
Field Experience: Troubleshooting Long Boot and High Resource Consumptions | http://channel9.msdn.com/Events/TechEd/Europe/2013/WCA-B315#fbid= |
and much more
Hack yourself First | http://www.troyhunt.com/2015/03/yow-conference-talk-hack-yourself-first.html |
Note:
The article was originally published by Erdal Ozkaya @ Erdal Ozkaya Personal Blog on April 19th, 2015. It is reproduced on this blog with an author’s permission.