File Analysis with TruffleHog
Offered By: Pluralsight
Course Description
Overview
In this cyber security course, you will learn to perform file analysis of source code repositories using the tool TruffleHog to keep your organization secure.
In this course, File Analysis with TruffleHog you will cover how to utilize TruffleHog to identify and detect sensitive data such as credentials accidentally committed to source code repository environments. You will discover how to audit your source environments including recent and historic source code commits. You will learn how to place decoy credentials in source code repositories and analyze your repositories for exposed credentials. When you are finished with this course, you will have the skills and knowledge to aid in mitigating technique T1552 using TruffleHog.
In this course, File Analysis with TruffleHog you will cover how to utilize TruffleHog to identify and detect sensitive data such as credentials accidentally committed to source code repository environments. You will discover how to audit your source environments including recent and historic source code commits. You will learn how to place decoy credentials in source code repositories and analyze your repositories for exposed credentials. When you are finished with this course, you will have the skills and knowledge to aid in mitigating technique T1552 using TruffleHog.
Taught by
Tim Coakley
Related Courses
Access Control Concepts(ISC)² via Coursera Cybersecurity Fundamentals
IBM via Coursera CompTIA Security+ Course Certification
Cybrary IT Security: Key Policies and Resources
LinkedIn Learning Adopting DevSecOps: The Holy Grail of Sustainable Security
Pluralsight