Students will scan a system in OpenVAS (Open Vulnerability Assessment) to discover and identify systems on the network that have vulnerabilities. Students will scan a system in OpenVAS (Open ...
Our CISM certification course and training for the CISM certification to show you have an all-around technical competence and an understanding of the business objectives around data security. Our CISM ...
The Open Worldwide Application Security Project (OWASP) is a community-led organization and has been around for over 20 years and is largely known for its Top 10 web application security risks (check ...
Advance your networking knowledge with this Networking Security Fundamentals for Security Practitioners course. Learn networking fundamentals through the lens of a security practitioner. Examine ...
Are you on the path to becoming a SOC Analyst or preparing for your CEH exam? This malware analysis course will help you advance your career and protect your organization from critical threats. Learn ...
Obtaining your SSCP certification signifies that you possess the ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, ...
Do you have what it takes to learn the art of social engineering, or master manipulation in cybersecurity? This social engineering course is essential for any aspiring penetration tester. Learn about ...
Excel as a Linux system administrator and pass the CompTIA Linux+ certification exam with this comprehensive course. Enjoy the flexibility of exploring selective module topics that include hardware ...
If you want to be a penetration tester, you need to get inside the mind of a hacker and learn why sites get hacked. In this Web Application Penetration Testing course by Cydefe, you’ll build upon your ...
Our self-paced online Virtualization Management training class focuses on installing, configuring and managing virtualization software. You?ll learn how to work your way around the cloud and how to ...
Learn about important secure coding methodologies including CRLF Injection, Directory Traversal, Information Leakage, Open Redirects, OS Command Injection, SQL Injection and Cross-site Scripting ...
Our OSINT certification course and training for open source intelligence (OSINT), the process of collecting and analyzing publicly available information that can be exploited by adversaries. Learn ...