Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

47 Results Found for "certification prep guide"

Results per page: 10 40 80

5 Highest-Paying ISACA Certifications

Article | July 09, 2019

ISACA certifications are some of the most popular and highest-paying in the Global Knowledge 2019 IT Skills and Salary Report.

Introduction to Cyber Warfare and Operations Design (ICWOD)

Course Code: 9719

This course provides a basic understanding of full-spectrum cyberspace operations; the complexities of the cyberspace environment; and planning, organizing, and integrating cyber ops. The course consists of presentations and exercises that teach students how to desig...

Delivery Formats

Defensive Cyberspace Operations Engineer (DCOE)

Course Code: 9733

Develop cyberspace operations skills and obtain a DCO-based certification.

Delivery Formats

PEN-200 - Penetration Testing with Kali Linux (PWK/OSCP)

Course Code: 840104

The industry-leading Penetration Testing with Kali Linux (PWK/PEN-200) course introduces penetration testing methodology, tools, and techniques in a hands-on, self-paced environment.

Delivery Formats

PEN-300 – Advanced Evasion Techniques and Breaching Defenses

Course Code: 840105

PEN-300 explores advanced penetration testing techniques. Learners gain experience bypassing security defenses and crafting custom exploits in real-world scenarios, enhancing expertise in ethical hacking and vulnerability assessment

Delivery Formats

WEB-300 – Advanced Web Attacks and Exploitation

Course Code: 840106

OffSec’s WEB-300 course dives deep into the latest web application penetration testing methodologies and techniques. Learners gain experience and elevate their skills in ethical hacking, vulnerability discovery, exploit development.

Delivery Formats

EXP-301 – Windows User Mode Exploit Development

Course Code: 840107

PEN-300 explores advanced penetration testing techniques. Learners gain experience bypassing security defenses and crafting custom exploits in real-world scenarios, enhancing expertise in ethical hacking and vulnerability assessment

Delivery Formats

Zero Day Exploits

White Paper | Oct. 23, 2012

A zero day exploit is an attack that was previously unknown to the target or security experts in general.

How to Become Certified in Risk and Information Systems Control

White Paper | July 06, 2021

This Certification Prep Guide provides an overview of ISACA’s Certified in Risk and Information Systems Control (CRISC) certification and offers helpful tips that you can use when preparing for your CRISC certification exam.

CyberSec First Responder: Threat Detection and Response

Course Code: 2180

Gain a broad view of how to respond to a cybersecurity incident while preparing for the CyberSec First Responder certification.

Delivery Formats