Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Spring into Savings — Get 50% Off Your Second Course

Search

Show Filters
Result Filters:

106 Results Found for "xtmmo fc 26 Visit Buyfc26coins.com for latest FC 26 coins news..xs8j"

Results per page: 10 40 80

PEN-200 - Penetration Testing with Kali Linux (PWK/OSCP)

Course Code: 840104

The industry-leading Penetration Testing with Kali Linux (PWK/PEN-200) course introduces penetration testing methodology, tools, and techniques in a hands-on, self-paced environment.

Delivery Formats

WEB-300 – Advanced Web Attacks and Exploitation

Course Code: 840106

OffSec’s WEB-300 course dives deep into the latest web application penetration testing methodologies and techniques. Learners gain experience and elevate their skills in ethical hacking, vulnerability discovery, exploit development.

Delivery Formats

EXP-301 – Windows User Mode Exploit Development

Course Code: 840107

PEN-300 explores advanced penetration testing techniques. Learners gain experience bypassing security defenses and crafting custom exploits in real-world scenarios, enhancing expertise in ethical hacking and vulnerability assessment

Delivery Formats

AIE - Artificial Intelligence Essentials

Course Code: 840111

The Artificial Intelligence Essentials (AIE) is a nontechnical, foundational AI certification designed to establish a global baseline of AI literacy.

Delivery Formats

CompTIA SecAI+ Certification Prep Course

Course Code: 840115

The CompTIA SecAI+ Certification Prep Course is designed to prepare learners for the CY0-001 exam. This course equips cybersecurity professionals with the practical skills needed to develop practical, job-ready skills for recognizing and responding to AI-driven threa...

Delivery Formats

COASP - Certified Offensive AI Security Professional

Course Code: 840113

The Certified Offensive AI Security Professional (COASP) equips you to identify and neutralize AI-specific threats before attackers do. And Bridges security, engineering, and data science so controls exist across the full AI life cycle. Participants will gain hands-o...

Delivery Formats

Cybersecurity Specializations – Incident Response and Forensic Analysis

Video | Oct. 31, 2018

This video focuses on the roles and responsibilities of incident response and forensic analysis job functions at successful cybersecurity organizations.

10 Ways Malicious Code Reaches Your Private Network

White Paper | July 13, 2010

Learn 10 common ways that malicious code can penetrate your network.

Ten Risky Security Behaviors to Avoid: Protect Your Organization

White Paper | Sep. 24, 2014

Read to learn more about common risky behaviors in security that typical workers engage in, and what you can do to avoid being the weakest link in your company.

Zero Day Exploits

White Paper | Oct. 23, 2012

A zero day exploit is an attack that was previously unknown to the target or security experts in general.