Information Technology > > Security

Основы технической поддержки

Это первый курс программы, которая должна подготовить вас к роли специалиста IT-поддержки начального...

ІТ-безпека: захист від цифрового кібершахрайства

Цей курс охоплює широкий спектр понять ІТ-безпеки, інструментів та найкращих практик. У ньому предст...

VEGA for Beginners: Scan for Web Vulnerabilities

This Guided Project 'VEGA for Beginners: Scan for Web Vulnerabilities' is for web developers, securi...

Threat Analysis

If you are an associate-level cybersecurity analyst who is working in security operation centers, th...

The Cybersecurity Culture Blueprint: A Proactive Approach

In today's rapidly evolving digital landscape, the importance of cybersecurity cannot be overstated....

Technical Deep Dive with Incident Response Tools

The Cyber Incident Response course will give students an understanding of how incidents are responde...

Sécurité des TI : Défense contre les pratiques sombres du numérique

Ce cours couvre une grande variété de concepts, d’outils et de meilleures pratiques en matière de sé...

Splunk Knowledge Manager 102

In this course, you will learn how fields are extracted and how to create regex and delimited field...

Security Awareness Training

The security of an organization is of the utmost importance and every member of the organization's s...

Securing a Cloud SQL for PostgreSQL Instance

This is a self-paced lab that takes place in the Google Cloud console. In this lab you will deploy a...

Rastreo de paquetes con Wireshark: Cree sus Primeros Filtros

Este Proyecto Guiado "Rastreo de paquetes con Wireshark: cree sus primeros filtros" es para brindarl...

Python for Command-and-control, Exfiltration and Impact

This course covers python for Command-and-control, Exfiltration and Impact.

Previous OWASP Risks

In this course, we will examine three very relevant security risks that were merged into larger topi...

Personnel & Third-Party Security

In this course, you will learn all about the process of implementing effective education, training,...

Paramétrer vos requêtes pour protéger contre les attaques d'injection avec Java

Dans ce projet guidé d'une heure, nous allons vous montrer ce qu’est l’injection SQL, et comment pro...