Information Technology > > Security
Основы технической поддержки
Это первый курс программы, которая должна подготовить вас к роли специалиста IT-поддержки начального...
ІТ-безпека: захист від цифрового кібершахрайства
Цей курс охоплює широкий спектр понять ІТ-безпеки, інструментів та найкращих практик. У ньому предст...
VEGA for Beginners: Scan for Web Vulnerabilities
This Guided Project 'VEGA for Beginners: Scan for Web Vulnerabilities' is for web developers, securi...
Threat Analysis
If you are an associate-level cybersecurity analyst who is working in security operation centers, th...
The Cybersecurity Culture Blueprint: A Proactive Approach
In today's rapidly evolving digital landscape, the importance of cybersecurity cannot be overstated....
Technical Deep Dive with Incident Response Tools
The Cyber Incident Response course will give students an understanding of how incidents are responde...
Sécurité des TI : Défense contre les pratiques sombres du numérique
Ce cours couvre une grande variété de concepts, d’outils et de meilleures pratiques en matière de sé...
Splunk Knowledge Manager 102
In this course, you will learn how fields are extracted and how to create regex and delimited field...
Security Awareness Training
The security of an organization is of the utmost importance and every member of the organization's s...
Securing a Cloud SQL for PostgreSQL Instance
This is a self-paced lab that takes place in the Google Cloud console. In this lab you will deploy a...
Rastreo de paquetes con Wireshark: Cree sus Primeros Filtros
Este Proyecto Guiado "Rastreo de paquetes con Wireshark: cree sus primeros filtros" es para brindarl...
Python for Command-and-control, Exfiltration and Impact
This course covers python for Command-and-control, Exfiltration and Impact.
Previous OWASP Risks
In this course, we will examine three very relevant security risks that were merged into larger topi...
Personnel & Third-Party Security
In this course, you will learn all about the process of implementing effective education, training,...
Paramétrer vos requêtes pour protéger contre les attaques d'injection avec Java
Dans ce projet guidé d'une heure, nous allons vous montrer ce qu’est l’injection SQL, et comment pro...