Cyber Crime Analyst Part 2
Cyber Forensics Investigator What you will learn You will become an expert in the field of cyber security. The course focuses on the latest technologies…
Cyber Forensics Investigator What you will learn You will become an expert in the field of cyber security. The course focuses on the latest technologies…
Trigger your Cyber Security journey with the basics you need to learn. What you will learn Understand the main topics in cyber security Understand the…
Protect yourself against hackers What you will learn Prevent falling for Common Attacks What is Social Engineering Detecting Phising Mails Why use Secure Passwords Preventing…
Network Operations For Beginners What you will learn Network Operations OSI Model TCP/IP Model Network Access Layer Internet Layer Transport Layer Application Layer IPv4 IPv6…
Secure your databases, prevent attacks and unauthorized access. What you will learn Enable Virtualization Installing Virtual Machine Installing and connecting to SQL Server Learn how…
Learn OWASP top 10 Cyber Security attacks. Use Penetration Testing as an ethical hacker to secure Web applications What you will learn Understand who OWASP…
Learn from the pros how to use Kali Linux easily and quickly What you'll learn Hacking Environment InstallIng VIrtual Box InstallIng KalI lInux and Other…
A beginner's guide to data security What You Will Learn Understand cyber-security terminology Differentiate between the various forms of malware Explore how malware attacks can…
Cybersecurity For Beginners: Python For Penetration Testing What You Will Learn Python For Ethical Hacking Network Attacks Weakness of Network Devices Penetration Testing of Network…
Learn how to govern and secure Artificial Intelligence and Machine Learning systems What you will learn Artificial Intelligence and Machine Learning risks How to create…
Learn The Cyber Forensics Essentials To Get You Started! What you will learn What Cybersecurity is Why we need Cybersecurity What Cyberattacks are How to…
Intermediate level developer course focused on Acronis Cyber Platform's Business Automation APIs for ISV, RMM, PSA, MSPs What you will learn Acronis Cyber Platform's Business…
Master the art of Pivoting What you will learn How to Pivot to Internal Networks through compromised hosts Forward Relays Reverse Relays Different tools to…
Choosing Strong Passwords (that you can actually live with) What you will learn Gain an appreciation for what passwords REALLY are and what they REALLY…
Learn about Cyber Security Attacks and How to Defeat them with Palo Alto Networks Firewalls What you will learn Learn about the Palo Alto Networks…
Be an expert in Analysing Phishing mails What you will learn Header Analysis DKIM (DomainKeys Identified Mail) Role SPF (Sender Policy Framework) Role Types of…