Veteran cybersecurity professional Hugh Shepherd shares career insights from his 20+ years of experience. Learn how to ...
NMAP is a powerful tool used by both attackers and defenders to scan networks. In this Scanning and Enumeration with NMAP course, Ken Underhill uses an NMAP lab to demonstrate the process for ...
In this COBIT training, we discover a success story of how COBIT was enacted to support the specific organization’s IT infrastructure. We will explore how COBIT can support organizational goals and ...
Take your incident response plans to the next level by exploring this “Implementing an Incident Response Plan” course with David Biser. He walks you through incident identification, the incident ...
Are you on the path to becoming a SOC Analyst or preparing for your CEH exam? This malware analysis course will help you advance your career and protect your organization from critical threats. Learn ...
ISACA’s Certified Information Systems Auditor (CISA) certification is for entry to mid-career professionals who want to understand the process of planning, executing, and reporting on risk-based ...
Are you a current or aspiring IT security practitioner who needs a basic introduction to Linux? Take this course to master the Linux operating system and the tools it provides for securing your ...
The Advanced Penetration Testing course teaches the cyber attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate ...
Excel as a Linux system administrator and pass the CompTIA Linux+ certification exam with this comprehensive course. Enjoy the flexibility of exploring selective module topics that include hardware ...