Information Technology > > Security
Основы технической поддержки
Это первый курс программы, которая должна подготовить вас к роли специалиста IT-поддержки начального...
ІТ-безпека: захист від цифрового кібершахрайства
Цей курс охоплює широкий спектр понять ІТ-безпеки, інструментів та найкращих практик. У ньому предст...
VEGA for Beginners: Scan for Web Vulnerabilities
This Guided Project 'VEGA for Beginners: Scan for Web Vulnerabilities' is for web developers, securi...
Threat Analysis
If you are an associate-level cybersecurity analyst who is working in security operation centers, th...
The Cybersecurity Culture Blueprint: A Proactive Approach
In today's rapidly evolving digital landscape, the importance of cybersecurity cannot be overstated....
Technical Deep Dive with Incident Response Tools
The Cyber Incident Response course will give students an understanding of how incidents are responde...
Sécurité des TI : Défense contre les pratiques sombres du numérique
Ce cours couvre une grande variété de concepts, d’outils et de meilleures pratiques en matière de sé...
Splunk Knowledge Manager 102
In this course, you will learn how fields are extracted and how to create regex and delimited field...
Security Awareness Training
The security of an organization is of the utmost importance and every member of the organization's s...
Securing a Cloud SQL for PostgreSQL Instance
This is a self-paced lab that takes place in the Google Cloud console. In this lab you will deploy a...
Rastreo de paquetes con Wireshark: Cree sus Primeros Filtros
Este Proyecto Guiado "Rastreo de paquetes con Wireshark: cree sus primeros filtros" es para brindarl...
Python for Command-and-control, Exfiltration and Impact
This course covers python for Command-and-control, Exfiltration and Impact.
Previous OWASP Risks
In this course, we will examine three very relevant security risks that were merged into larger topi...
Personnel & Third-Party Security
In this course, you will learn all about the process of implementing effective education, training,...
Paramétrer vos requêtes pour protéger contre les attaques d'injection avec Java
Dans ce projet guidé d'une heure, nous allons vous montrer ce qu’est l’injection SQL, et comment pro...
Network Security Support Fundamentals
Explore network security with the Network Security Support Fundamentals online course. Designed to o...
Network Defense Essentials (NDE)
Network Defense Essentials covers the fundamental concepts of information security and network defen...
NIST DoD RMF
The Risk Management Framework (RMF) provides a disciplined, structured and flexible process for mana...
NIST 800-171
NIST SP 800-171 is a cybersecurity framework of 110 controls in 14 families published by the Nationa...
Microsoft Azure Management Tools and Security Solutions
Microsoft Azure offers a wide range of services to deploy your applications. To keep control of your...