Course Code: 3442
New – What is CCSA? With our new and exclusive course, learn how to configure Check Point Security Gateways and Management Software Blades within your organization.
Course Code: 3443
New – Learn to configure Check Point Security Gateway and Management Software Blades, as well as how to build, modify, deploy, & troubleshoot CPS systems on GAiA OS.
Kerry Doyle discusses Security and the Rise of Machine-to-Machine (M2M) Communications to help avoid any security risk in the future. Learn more here.
When it comes to cyber security, we have a lot to look out for, take precautions against and be paranoid about. Learn more about these cybersecurity risks here.
The purpose of a “hack back” is to identify an attacker and possibly recover stolen data in a retaliatory manner. Learn if there is a legal precedent to "hacking back."
There’s a lot of pressure on IT decision-makers to fill the cybersecurity holes in their organization. The cyber skills shortage is palpable and growing. Cybersecurity is the most challenging IT hiring area in the world. Those of you expecting to hire your way out of your cyber skills gaps, we have some bad news for you—it’s not viable.
Course Code: 100336
New – Learn how to defend against attacks using the F5 Web Application Firewall (WAF).
Learn about the importance of network forensics for system monitoring and attack mitigation.
Course Code: 840103
Exclusive – Cybersecurity Specialization: Threat Modeling dives into the critical practice of threat modeling, a key component in modern cybersecurity strategies. Participants will learn to identify, analyze, and mitigate potential security threats in complex systems. The course...
Course Code: 3401
Prepare for the CHFI certification, this course covers major forensic investigation scenarios that enable you to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.