Course Code: 840104
The industry-leading Penetration Testing with Kali Linux (PWK/PEN-200) course introduces penetration testing methodology, tools, and techniques in a hands-on, self-paced environment.
Course Code: 840105
PEN-300 explores advanced penetration testing techniques. Learners gain experience bypassing security defenses and crafting custom exploits in real-world scenarios, enhancing expertise in ethical hacking and vulnerability assessment
Course Code: 840106
OffSec’s WEB-300 course dives deep into the latest web application penetration testing methodologies and techniques. Learners gain experience and elevate their skills in ethical hacking, vulnerability discovery, exploit development.
Course Code: 840107
PEN-300 explores advanced penetration testing techniques. Learners gain experience bypassing security defenses and crafting custom exploits in real-world scenarios, enhancing expertise in ethical hacking and vulnerability assessment
Course Code: 840017
Dive into the rapidly evolving world of Machine Learning Operations (MLOps) and AI Security with our intensive 3-day boot camp. MLOps bridges the gap between data science and operation teams, delivering continuous collaboration and integration to drive the efficient...
Course Code: 840102
Exclusive – DevSecOps is designed to empower you with the knowledge and skills necessary to seamlessly integrate security into your DevOps pipeline. You will gain a deep understanding of DevSecOps principles and practices, ensuring that security is an integral part of your softw...
Course Code: 1120
This hands-on course teaches developers sound processes and practices to apply to the entire software development lifecycle. Enroll today with Global Knowledge.
Course Code: 3617
Learn to think like a hacker while looking for system weaknesses. Prepare for the CEH Certification Exam with training from EC Council instructors. Includes a free exam voucher.
Course Code: 840100
Exclusive – This course is designed to equip you with the essential knowledge and skills to master complex IAM practices and strategies. We will cover various advanced concepts, frameworks, and technologies that are pivotal in securing and managing digital identities within an o...
Learn why what you don't know about cybersecurity can hurt you in our webinar.