Network & Security

bg
Cyber Awareness Training - for employees and individuals

Cyber Awareness Training - for employees and individuals

Learn how to detect Cyber Threats and how to protect yourself from them

bg
Fundamental Questions on ChatGPT

Fundamental Questions on ChatGPT

Practice test on ChatGPT

bg
Advanced Ethical Hacking : Mastery AI & ChatGPT -Volume 2

Advanced Ethical Hacking : Mastery AI & ChatGPT -Volume 2

AI & ChatGPT in Ethical Hacking: Master Post-Exploitation, Exploit Development, ...

bg
Kali Linux for Ethical Hackers

Kali Linux for Ethical Hackers

Master Kali Linux: Metasploit, Burp Suite, Nmap, Hydra, SET, SQLMap, John & More

bg
5G Core Design Principles

5G Core Design Principles

5G Core Network Detail Concepts with Sample Flows and Traces

bg
Network Firewalls for Beginners - With Hands-On Labs

Network Firewalls for Beginners - With Hands-On Labs

Master the Basics of Network Firewalls: Protecting Networks with Essential Secur...

bg
Defending Against Generative AI-Based Social Engineering

Defending Against Generative AI-Based Social Engineering

How to defend against phishing emails, deepfakes, and many other types of social...

bg
Palo Alto Prisma Access SASE Security

Palo Alto Prisma Access SASE Security

#With Labs #Panorama Managed Prisma Access #Palo Alto SASE Security #Theory #SS...

bg
Training Exams FortiMail v7.2 Questions and Detailed Answers

Training Exams FortiMail v7.2 Questions and Detailed An...

Fortinet NSE6 - FortiMail v7.2 Training Exams

bg
NIST Cybersecurity Framework (CSF) 2.0 Core

NIST Cybersecurity Framework (CSF) 2.0 Core

A Practical Guide with Examples

bg
Ethernet Switching Mastery by Arash Deljoo

Ethernet Switching Mastery by Arash Deljoo

From Basics to Advanced Switching Concepts

bg
AWS Security Best Practices

AWS Security Best Practices

Ensuring Compliance and Transparency through Cloud Auditing Excellence

bg
CCSP Domain 4 - Cloud Application Security

CCSP Domain 4 - Cloud Application Security

Exam preparation - This domain is in alignment with the August 2022 exam outline

bg
Securing GenAI Systems: Best Practices

Securing GenAI Systems: Best Practices

Building a Secure GenAI System: Scalable, Robust, and User-Friendly Security Str...

bg
Practical Aspects of Information System Audit (For Beginner)

Practical Aspects of Information System Audit (For Begi...

Practical Aspects of Information System Audit (For Beginners)

We use cookies to improve your experience on our site. By continuing to browse the site you are agreeing to our use of cookies Find out more here