Course Catalogue
-
Cloud Security Web app security API Security
-
Mobile App security
-
IoT Security
-
Red team – Offensive Security
-
Detections
-
Digital Forensics
-
Threat Research
-
CVE Analysis
-
VAPT
-
Blockchain Security
-
Certified Ethical Hacker - CEHv10: Cloud Computer Attacks
-
Certified Ethical Hacker - CEHv10: FootprintingCertified Ethical hacker - CEHv10: Tools to get startedCheckmarx
-
OWASP A8 and A3: Cross-Site Attacks
-
OWASP Overview
-
Nessus
-
CloudWatch
-
Security group and access configurations in IAM
-
Code Access
-
Security and Cryptography in .NET
-
Secure Programming: Encryption
-
Ethical Hacker: Incident Response / Risk Assessment
-
Authentication & Encryption: Best Practices
-
CCSP 2019: Data Retention & Events
-
Datadog
-
Threat modeling
-
Assessing Your Organization's Risks
-
Identifying Risks in Your Organization
-
Knowing When to Take Strategic Risks
-
Responding Effectively to Risks
-
AZ-305 - Microsoft Azure Infrastructure Solutions: Files Share
-
Cloud Blockchains: Single Organization Networks on Amazon Managed Blockchain
-
Certified Ethical Hacker - CEHv10: IoT Hacking and Countermeasures
-
Certified Ethical Hacker - CEHv10: IoT Attacks
-
Compliance Issues and Strategies: Data Compliance
-
SSIS -Components,Packages,Security,Solutions
-
Cloud App Testing
-
Fortify software
-
Certified Ethical hacker (CEH)
-
CompTIA Security+, Network+
-
Offensive Security Certified Professional (OSCP)
-
Offensive Security Experienced Professional (OSEP)
-
Certified Red team professional (CRTP)
-
Cisco Certified Network Associate (CCNA), Cisco ASA firewall
-
Basics of AI with cybersecurity
-
Secure Implementation with AI
-
Security Analysis with AI
-
Security Engineering with AI