Trending Network & Security Courses

bg
Communications Multimédia

Communications Multimédia

Les techniques de compression (Audio/Vidéo) et envoi de données en temps réel su...

bg
IP MASTERCLASS

IP MASTERCLASS

Become an IP master with this course!

bg
Master STRIDE Threat Modeling: Hack-Proof Your Apps

Master STRIDE Threat Modeling: Hack-Proof Your Apps

This course provides real-world case studies, hands-on threat modeling technique...

bg
Attacking and Defending the computer networks

Attacking and Defending the computer networks

Learn how to attack networks and how to defend them from the most common attacks

bg
Hacking AngularJS Applications

Hacking AngularJS Applications

Learn How to Detect and Exploit Security Vulnerabilities in AngularJS Applications

bg
GenAI Cybersecurity: OWASP Top 10, MITRE ATLAS & API Attacks

GenAI Cybersecurity: OWASP Top 10, MITRE ATLAS & API At...

Master GenAI & LLM cybersecurity, OWASP, MITRE ATLAS mappings, and API attack te...

bg
AWS Security Services - Policy Generator

AWS Security Services - Policy Generator

Leverage Policy Generator to Help Secure AWS

bg
Red and Blue Team Foundations Course - VAPT & Infosec Basics

Red and Blue Team Foundations Course - VAPT & Infosec B...

VAPT & Information Security for Absolute Beginners, Build the basics of Ethical ...

bg
Microsoft Security Copilot

Microsoft Security Copilot

Learn Microsoft Security Copilot | Hands-on experience | Learn to leverage AI fo...

bg
CCSP Domain 2 - Cloud Data Security

CCSP Domain 2 - Cloud Data Security

Exam preparation - This domain is in alignment with the August 2022 exam outline

bg
Intro to European Digital Operational Resilience Act (DORA)

Intro to European Digital Operational Resilience Act (D...

Mastering DORA Compliance: Building Resilient Financial Operations

bg
ISO 27004: Implement ISMS Measurement Step by Step

ISO 27004: Implement ISMS Measurement Step by Step

Unlocking 27001:2022 ISMS Excellence: A Practical Guide to ISO 27004 Measurement

bg
Introduction to Penetration Testing and Ethical Hacking

Introduction to Penetration Testing and Ethical Hacking

Easy Ethical Hacking for Beginners: Hands-on Demos with Downloadable Lab Manuals...

bg
Learn Ethical Hacking with CTF Strategies

Learn Ethical Hacking with CTF Strategies

Step-by-step ethical hacking training using CTF challenges to develop real-world...

bg
COMPLEX CISSP practice questions #1: All CISSP domains 125Q

COMPLEX CISSP practice questions #1: All CISSP domains ...

Test your knowledge on 125 COMPLEX CISSP questions. Learn how to answer CISSP qu...

bg
Intune Training - Enterprise Mobile Device Management

Intune Training - Enterprise Mobile Device Management

Essential Mobile Device Management for every Enterprise

We use cookies to improve your experience on our site. By continuing to browse the site you are agreeing to our use of cookies Find out more here