Information Technology > > Security

Основы технической поддержки

Это первый курс программы, которая должна подготовить вас к роли специалиста IT-поддержки начального...

ІТ-безпека: захист від цифрового кібершахрайства

Цей курс охоплює широкий спектр понять ІТ-безпеки, інструментів та найкращих практик. У ньому предст...

VEGA for Beginners: Scan for Web Vulnerabilities

This Guided Project 'VEGA for Beginners: Scan for Web Vulnerabilities' is for web developers, securi...

Threat Analysis

If you are an associate-level cybersecurity analyst who is working in security operation centers, th...

The Cybersecurity Culture Blueprint: A Proactive Approach

In today's rapidly evolving digital landscape, the importance of cybersecurity cannot be overstated....

Technical Deep Dive with Incident Response Tools

The Cyber Incident Response course will give students an understanding of how incidents are responde...

Sécurité des TI : Défense contre les pratiques sombres du numérique

Ce cours couvre une grande variété de concepts, d’outils et de meilleures pratiques en matière de sé...

Splunk Knowledge Manager 102

In this course, you will learn how fields are extracted and how to create regex and delimited field...

Security Awareness Training

The security of an organization is of the utmost importance and every member of the organization's s...

Securing a Cloud SQL for PostgreSQL Instance

This is a self-paced lab that takes place in the Google Cloud console. In this lab you will deploy a...

Rastreo de paquetes con Wireshark: Cree sus Primeros Filtros

Este Proyecto Guiado "Rastreo de paquetes con Wireshark: cree sus primeros filtros" es para brindarl...

Python for Command-and-control, Exfiltration and Impact

This course covers python for Command-and-control, Exfiltration and Impact.

Previous OWASP Risks

In this course, we will examine three very relevant security risks that were merged into larger topi...

Personnel & Third-Party Security

In this course, you will learn all about the process of implementing effective education, training,...

Paramétrer vos requêtes pour protéger contre les attaques d'injection avec Java

Dans ce projet guidé d'une heure, nous allons vous montrer ce qu’est l’injection SQL, et comment pro...

Network Security Support Fundamentals

Explore network security with the Network Security Support Fundamentals online course. Designed to o...

Network Defense Essentials (NDE)

Network Defense Essentials covers the fundamental concepts of information security and network defen...

NIST DoD RMF

The Risk Management Framework (RMF) provides a disciplined, structured and flexible process for mana...

NIST 800-171

NIST SP 800-171 is a cybersecurity framework of 110 controls in 14 families published by the Nationa...

Microsoft Azure Management Tools and Security Solutions

Microsoft Azure offers a wide range of services to deploy your applications. To keep control of your...