4 out of 5
4
6 reviews

Defensive Security

The Masterstudy LMS is a free plugin but there is a paid PRO version as well. PRO version has everything from the free plugin plus a bunch of premium addons extending the functionality in many ways

34 students enrolled

The primary goal of this quick start guide is to introduce you to Unreal Engine 4`s (UE4) development environment. By the end of this guide, you`ll know how to set up and develop C++ Projects in UE4. This guide shows you how to create a new Unreal Engine project, add a new C++ class to it, compile the project, and add an instance of a new class to your level. By the time you reach the end of this guide, you`ll be able to see your programmed Actor floating above a table in the level.

This quick start guide shows you how to add assets to your Unreal Engine (UE4) games. By the end of this guide, you`ll know how to use the Project Browser to create new projects and navigate the Content Browser to find and add content. You`ll also know where to find information on the FBX Content Pipeline while learning how to use the Material Editor to modify Materials before applying them to a Static Mesh Actor.

Main Features

  • Achieve Hollywood best quality visuals out of the box.
  • With complete C++ source code access, you can study.
  • Comes with designer-friendly Blueprint visual scripting.
  • Unreal Engine provides Robust Multiplayer Framework.
  • The built-in Cascade visual effects editor enables particles.
  • Unreal Engine 4`s Material Editor makes use of physically.

What is the target audience?

  • You might be thinking, all of the above – and that is fine. But as a complete beginner learning Unreal Engine 4.
  • The rendering system in Unreal Engine 4 is an all-new, DirectX 11 pipeline that includes deferred shading.

Learning a new game engine as a complete beginner is very intimidating. There are a lot of tutorials, documentation and advice already out but how do you start and proceed with learning Unreal Engine 4 is unclear. You get pulled into many different directions and end up confused and overwhelmed.

I have spent a lot of time deconstructing what it takes to learn a game engine from scratch. What it is that you should focus on first and what you should avoid until later.

A Refresher on Defensive Security Concepts

1
DS - Deep dive into the core of cybersecurity
2
DS - Managing cybersecurity's legendary pain point: Passwords
3
DS - Managing cybersecurity's legendary pain point: Passwords
4
DS - Mastering defense in depth
5
DS - Mastering defense in depth
6
DS - Comparing the blue and red teams
7
DS - Comparing the blue and red teams

Managing Threats - Vulnerabilities and Risks

1
DS - Understanding cybersecurity vulnerabilities and threats
2
DS - Understanding cybersecurity vulnerabilities and threats
3
DS - Managing cybersecurity risks
4
DS - Managing cybersecurity risks
5
DS - The NIST Cybersecurity Framework
6
DS - Creating an effective Business Continuity Plan (BCP)
7
DS - Creating an effective Business Continuity Plan (BCP)
8
DS - Implementing a best-in-class DRP
9
DS - Implementing a best-in-class DRP

Comprehending Policies | Procedures | Compliance and Audits

1
DS - Creating world-class cybersecurity policies and procedures
2
DS - Creating world-class cybersecurity policies and procedures
3
DS - Understanding and achieving compliance
4
DS - Understanding and achieving compliance
5
DS - Exploring, creating, and managing audits
6
DS - Exploring, creating, and managing audits
7
DS - Applying a CMM
8
DS - Applying a CMM

Patching Layer 8

1
DS - Understanding layer 8 – the insider threat
2
DS - Understanding layer 8 – the insider threat
3
DS - Mastering the art of social engineering
4
DS - Mastering the art of social engineering
5
DS - Defending against social engineering attacks (patching layer 8)
6
DS - Defending against social engineering attacks (patching layer 8)

Cybersecurity Technologies and Tools

1
DS - Advanced wireless tools for cybersecurity
2
DS - Pentesting tools and methods
3
DS - Pentesting tools and methods
4
DS - Dealing with APTs
5
DS - Applying forensics tools and methods
6
DS - Leveraging security threat intelligence
7
DS - Leveraging security threat intelligence
8
DS - Converting a threat into a solution
9
DS - Converting a threat into a solution

Securing Windows Infrastructures

1
DS - Applying Windows hardening
2
DS - Applying Windows hardening
3
DS - Creating a patching strategy
4
DS - Creating a patching strategy
5
DS - Applying security to AD
6
DS - Applying security to AD
7
DS - Mastering endpoint security
8
DS - Mastering endpoint security
9
DS - Leveraging encryption
10
DS - Leveraging encryption

Hardening a Unix Server

1
DS - Securing Unix services
2
DS - Securing Unix services
3
DS - Applying secure file permissions
4
DS - Applying secure file permissions
5
DS - Enhancing the protection of the server by improving your access controls
6
DS - Enhancing the protection of the server by improving your access controls
7
DS - Configuring host-based firewalls
8
DS - Configuring host-based firewalls
9
DS - Advanced management of logs
10
DS - Advanced management of logs

Enhancing Your Network Defensive Skills

1
DS - Using the master tool of network mapping – Nmap
2
DS - Using the master tool of network mapping – Nmap
3
DS - Improving the protection of wireless networks
4
DS - Improving the protection of wireless networks
5
DS - Introducing Wireshark
6
DS - Working with IPS/IDS
7
DS - Working with IPS/IDS

Deep Diving into Physical Security

1
DS - Understanding physical security and associated threats
2
DS - Understanding physical security and associated threats
3
DS - Physical security mechanisms
4
DS - Physical security mechanisms
5
DS - Mastering physical security
6
DS - Mastering physical security

Applying IoT Security

1
DS - Understanding the Internet of Things
2
DS - Understanding IoT networking technologies
3
DS - Understanding IoT networking technologies
4
DS - Improving IoT security
5
DS - Improving IoT security
6
DS - Creating cybersecurity hardware using IoT-enabled devices
7
DS - Creating cybersecurity hardware using IoT-enabled devices
8
DS - Bonus track – Understanding the danger of unauthorized IoT devices
9
DS - Bonus track – Understanding the danger of unauthorized IoT devices

Secure Development and Deployment on the Cloud

1
DS - Secure deployment and implementation of cloud applications
2
DS - Securing Kubernetes and APIs
3
DS - Securing Kubernetes and APIs
4
DS - Hardening database services
5
DS - Hardening database services
6
DS - Testing your cloud security
7
DS - Testing your cloud security

Vulnerability Assessment Tools

1
DS - Dealing with vulnerabilities
2
DS - Dealing with vulnerabilities
3
DS - Using a vulnerability assessment scanner (OpenVAS)
4
DS - Using a vulnerability assessment scanner (OpenVAS)
5
DS - Overview of Nexpose Community
6
DS - Overview of Nexpose Community

Mastering Web App Security

1
DS - Gathering intelligence about your site/web application
2
DS - Leveraging DVWA
3
DS - Leveraging DVWA
4
DS - Overviewing the most common attacks on web applications
5
DS - Overviewing the most common attacks on web applications
6
DS - Using Burp Suite
7
DS - Using Burp Suite
8
DS - SQL injection attack on DVWA
9
DS - SQL injection attack on DVWA
10
DS - Brute forcing web applications' passwords
11
DS - Brute forcing web applications' passwords

Malware Analysis

1
DS - Why should I analyze malware?
2
DS - Types and categories of malware analysis
3
DS - Best malware analysis tools
4
DS - Performing malware analysis

Malware Analysis

1
DS - Why should I analyze malware?
2
DS - Types and categories of malware analysis
3
DS - Best malware analysis tools
4
DS - Performing malware analysis

Practicing Forensics

1
DS - Introduction to digital forensics
2
DS - Digital forensics on defensive security
3
DS - Forensics platforms
4
DS - Finding evidence
5
DS - Mobile forensics
6
DS - Managing the evidence (from a legal perspective)

Leveraging Pentesting for Defensive Security

1
DS - Understanding the importance of logs
2
DS - Understanding the importance of logs
3
DS - Knowing your enemy's best friend – Metasploit
4
DS - Knowing your enemy's best friend – Metasploit
5
DS - Other offensive hacking tools
6
DS - Other offensive hacking tools

Achieving Automation of Security Tools

1
DS - Why bother with automation?
2
DS - Why bother with automation?
3
DS - Types of automated attacks
4
DS - Types of automated attacks
5
DS - Automation of cybersecurity tools using Python
6
DS - Automation of cybersecurity tools using Python
7
DS - Cybersecurity automation with the Raspberry Pi

Practicing Forensics

1
DS - Introduction to digital forensics
2
DS - Digital forensics on defensive security
3
DS - Forensics platforms
4
DS - Finding evidence
5
DS - Mobile forensics
6
DS - Managing the evidence (from a legal perspective)

The Master's Compilation of Useful Resources

1
DS - Free cybersecurity templates
2
DS - Must-have web resources
3
DS - Must-have web resources
4
DS - Industry-leading best practices
5
DS - Industry-leading best practices
Faq Content 1
Faq Content 2

Productivity Hacks to Get More Done in 2018

— 28 February 2017

  1. Facebook News Feed Eradicator (free chrome extension) Stay focused by removing your Facebook newsfeed and replacing it with an inspirational quote. Disable the tool anytime you want to see what friends are up to!
  2. Hide My Inbox (free chrome extension for Gmail) Stay focused by hiding your inbox. Click "show your inbox" at a scheduled time and batch processs everything one go.
  3. Habitica (free mobile + web app) Gamify your to do list. Treat your life like a game and earn gold goins for getting stuff done!


4
4 out of 5
6 Ratings

Detailed Rating

Stars 5
3
Stars 4
0
Stars 3
3
Stars 2
0
Stars 1
0

{{ review.user }}

{{ review.time }}
 

Show more
Please, login to leave a review
masterstudy_placeholder
30-Day Money-Back Guarantee

Includes

9 hours
Full lifetime access
Access on mobile and TV

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
Defensive Security
Category:
4 out of 5
4
6 reviews
Price:
Free