Network & Security

bg
Ultimate Flipper Zero Course (EN)

Ultimate Flipper Zero Course (EN)

Unlock the full potential of your Flipper Zero with my hands-on course and learn...

bg
Intune Training - Enterprise Mobile Device Management

Intune Training - Enterprise Mobile Device Management

Essential Mobile Device Management for every Enterprise

bg
COMPLEX CISSP practice questions #1: All CISSP domains 125Q

COMPLEX CISSP practice questions #1: All CISSP domains ...

Test your knowledge on 125 COMPLEX CISSP questions. Learn how to answer CISSP qu...

bg
Learn Ethical Hacking with CTF Strategies

Learn Ethical Hacking with CTF Strategies

Step-by-step ethical hacking training using CTF challenges to develop real-world...

bg
Introduction to Penetration Testing and Ethical Hacking

Introduction to Penetration Testing and Ethical Hacking

Easy Ethical Hacking for Beginners: Hands-on Demos with Downloadable Lab Manuals...

bg
ISO 27004: Implement ISMS Measurement Step by Step

ISO 27004: Implement ISMS Measurement Step by Step

Unlocking 27001:2022 ISMS Excellence: A Practical Guide to ISO 27004 Measurement

bg
Intro to European Digital Operational Resilience Act (DORA)

Intro to European Digital Operational Resilience Act (D...

Mastering DORA Compliance: Building Resilient Financial Operations

bg
CCSP Domain 2 - Cloud Data Security

CCSP Domain 2 - Cloud Data Security

Exam preparation - This domain is in alignment with the August 2022 exam outline

bg
Microsoft Security Copilot

Microsoft Security Copilot

Learn Microsoft Security Copilot | Hands-on experience | Learn to leverage AI fo...

bg
Red and Blue Team Foundations Course - VAPT & Infosec Basics

Red and Blue Team Foundations Course - VAPT & Infosec B...

VAPT & Information Security for Absolute Beginners, Build the basics of Ethical ...

bg
AWS Security Services - Policy Generator

AWS Security Services - Policy Generator

Leverage Policy Generator to Help Secure AWS

bg
Wireless Design by Arash Deljoo

Wireless Design by Arash Deljoo

Enterprise Wireless Design

bg
Generative AI For Cyber Security Professionals Course 2025

Generative AI For Cyber Security Professionals Course 2025

Master Generative AI Solutions For Cyber Security Professionals, Mitigate Risks,...

bg
All About RCS Chat Sessions

All About RCS Chat Sessions

MSRP Setup, Presence Server, SIP Signaling, 1 to 1 & Group Chats, QoS Control, S...

bg
Getting started with bug bounty

Getting started with bug bounty

Learn the Art of Finding Bugs and Earning Bounties

We use cookies to improve your experience on our site. By continuing to browse the site you are agreeing to our use of cookies Find out more here