Veteran cybersecurity professional Hugh Shepherd shares career insights from his 20+ years of experience. Learn how to ...
Get an introduction to protecting your network with this Fundamentals of Vulnerability Management training. Ken Underhill explains how to use automation to manage vulnerabilities and goes over the ...
If you want to be a penetration tester, you need to get inside the mind of a hacker and learn why sites get hacked. In this Web Application Penetration Testing course by Cydefe, you’ll build upon your ...
Incident Response Recovery covers the actual recovery process from an incident that was identified and managed. It goes over the proper documentation necessary after the incident is handled, the legal ...
Need some incident response training on your path to becoming a network engineer or cyber defense analyst? This course will introduce you to incident response and prepare you to conduct forensic ...
ISACA’s Certified Information Systems Auditor (CISA) certification is for entry to mid-career professionals who want to understand the process of planning, executing, and reporting on risk-based ...
Do you have what it takes to learn the art of social engineering, or master manipulation in cybersecurity? This social engineering course is essential for any aspiring penetration tester. Learn about ...
Do you develop and maintain information system controls? Interested in ops and compliance? Certified in Risk and Information Systems Control is for you! Our CRISC training course will prepare you to ...
Obtaining your SSCP certification signifies that you possess the ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, ...