Veteran cybersecurity professional Hugh Shepherd shares career insights from his 20+ years of experience. Learn how to ...
As a defender, you need to understand your adversary. In this Evasion for Incident Handlers course, Ken Underhill gives a high-level overview of how bad actors circumvent antivirus and anti-malware ...
Excel as a Linux system administrator and pass the CompTIA Linux+ certification exam with this comprehensive course. Enjoy the flexibility of exploring selective module topics that include hardware ...
Create a free account to start exploring the platform. In this course, what we're going to be covering, we're going to start off with just some of the basics, for instance, what do we mean when we say ...
Log analysis involves reviewing and evaluating system activities to help mitigate risks. If you’re training to be a SOC Analyst, then you’ll need log analysis training. This course will review web ...
This is the fourth course in Ed Amoroso's Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Cyber Security Expertise. The CISO must serve as the governing expert in ...
ISACA’s Certified Information Systems Auditor (CISA) certification is for entry to mid-career professionals who want to understand the process of planning, executing, and reporting on risk-based ...
Obtaining your SSCP certification signifies that you possess the ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, ...
If you want to be a penetration tester, you need to get inside the mind of a hacker and learn why sites get hacked. In this Web Application Penetration Testing course by Cydefe, you’ll build upon your ...