Master Burp Suite: Learn to Identify and Exploit Web Vulnerabilities from Scratch Description Unlock the secrets…
Category: Network & Security
Online Safety: Cybersecurity, Health & Scam Prevention
Basic Online Safety guide to cyber hygiene, GP services, prescriptions, online banking, budgeting and benefits Description…
Cybersecurity 101: Foundations for Absolute Beginners
Master the basics of cybersecurity, protect your data, and gain hands-on skills using real-world tools and…
ISO 27001:2022 Advanced ISMS Auditing Techniques Workshop
Master ISO 27001:2022 auditing techniques, risk-based ISMS audits, Annex A controls, CAPA reviews, and improvement Description…
Red Team Mastery: Advanced Offensive Security
Learn red teaming basics to advanced techniques, including lab setup, hacking networks, and exploiting systems effective…
The Complete Social Engineering & Anti-Phishing Course
Learn ethical phishing, device control, and social engineering defense using Storm-Breaker toolkit. Description The Complete Social…
Ultimate AWS Bootcamp by School of Devops ®
Learn to build a scalable, fault tolerant, self healing infrastructure on AWS. VPC, EC2, RDS, S3,…
Ultimate Openshift (2021) Bootcamp by School of Devops®
With Openshift 4.6 and 3.10 versions, Kubernetes, Jenkins Pipelines, Prometheus, Istio, Micro Services, PaaS Description Just…
Ultimate DevSecOps Bootcamp by School of Devops
Build Complete DevSecOps Pipeline with Container Based Delivery, CI/CD on Kubernetes with all Open Source Tools…
Pentesting GenAI LLM models: Securing Large Language Models
Master LLM Security: Penetration Testing, Red Teaming & MITRE ATT&CK for Secure Large Language Models Description…
Active Directory Pentesting with Kali Linux Practical Lab
Learn AD Pentesting with Kali, Red Team, Blue Team, and Certification Ready Description Active Directory (AD)…
Malware Analysis, Incident Response, Disaster Recovery & BCP
Incident response & disaster recovery for IT security incidents – ie malware & ransomware on your…
Implement NIST Zero Trust Architecture (ZTA) Step by Step
Master NIST Zero Trust Architecture: Step-by-Step Guide to Implementing Advanced Cybersecurity Practices Description Unlock the full…
Bug Bounty: De Novato a Experto con PoC Reales y Live Hunt
Aprende bug bounty con PoCs personales, sesiones en vivo, investigación de vulnerabilidades reales, reportes y habilidad…