• Exclusive

    Hey Guest, unlock an instant 10% bonus discount when you upgrade via the Crypoverse gateway.

  1. protectaccount

    IT & Software Cybrary – Certified Information System Auditor (CISA)

    In order to face the dynamic requirements of meeting enterprise vulnerability management challenges, this CISA course covers the auditing process to ensure that you have the ability to analyze the state of your organization and make changes where needed. Course Description For Cyber Security...
  2. protectaccount

    IT & Software USB Drop Attack | Cybrary

    Malicious devices are everywhere these days, whether you can see them or not. Some take the form of malicious wireless networks that steal information. Others are physically planted and can do practically anything a hacker desires. These devices are designed to destroy, steal, and infect all...
  3. protectaccount

    IT & Software Check Point Jump Start | Cybrary

    Create an account with Pearson Vue to take the 25 question Check Point Jump Start exam (Exam 156-411): After logging in, the exam can be found in the Online Exam Catalog [see View Online Exams | Accreditation (un-Proctored)]. This initial module introduces the Check Point cybersecurity...
  4. protectaccount

    IT & Software PCI DSS: Payment Card Industry Data Security Standard | Cybrary

    This online PCI DSS training course covers the basic aspects of the PCI Data Security Standard for handling credit card data. It’s designed for professionals working for companies that must comply with the PCI DSS and its impact on company operations. Link: *** Hidden text: You do not have...
  5. protectaccount

    IT & Software Certified Cloud Security Professional (CCSP) | Cybrary

    The CCSP certification allows you to showcase your cloud knowledge and improve your organization’s security posture. It can also help you obtain an increase in compensation and create better positioning for new job opportunities. Prerequisites for this CCSP Training While there are no...
  6. protectaccount

    IT & Software CISO Security Controls: Network Controls | Cybrary

    Course Description Dr. Amoroso provides an overview of Certification Authority (CA) and Public Key Infrastructure (PKI) Solutions, Cloud Security and Cloud Security Access Brokers (CASB), Distributed Denial of Service (DDOS) Security, Email Security, Border Gateway Protocol (BGP) and Domain Name...
  7. protectaccount

    IT & Software Computer Hacking and Forensics | Cybrary

    Course Description Welcome to the Computer Hacking and Forensics course! Progress is a nice word. But change is its motivator. And change has its enemies.” – Robert Kennedy Welcome to Cybrary’s computer forensics training course! Industry change is here, traditionally, computer forensics...
  8. protectaccount

    IT & Software End User Mobile Security | Cybrary

    Course Description Many organizations have begun allowing employees to use their personal devices for work purposes. Although convenient for users, the concept of Bring your Own Device (BYOD) has opened companies up to many security issues. Therefore, users must know the risks of having...
  9. protectaccount

    IT & Software Executive Vulnerability Management | Cybrary

    Course Description Vulnerability management is how security vulnerabilities are identified, evaluated, and treated in an organization. Understanding vulnerabilities is instrumental in any organization, large or small. This course will detail the creation of a vulnerability management program...
  10. protectaccount

    IT & Software Introduction to Vagrant | Cybrary

    Course Description The course is for the absolute beginner wanting to learn about Developer Operations (Dev Ops) application – Vagrant. Vagrant is similar to another application called Puppet. Topics that students will learn are the origins of Vagrant, how to install Vagrant. The different...
  11. protectaccount

    IT & Software Enterprise Security Case Management | Cybrary

    Course Description Improper case management can lead to adverse outcomes and significantly increase the time it takes a security team to detect or respond to active threats in an enterprise environment. If and when security cases result in litigation, it is vital that the case management...
  12. protectaccount

    IT & Software Asset Security Fundamentals | Cybrary

    Course Description Students will learn how to protect each asset type and learn how to achieve asset protection. The course will also cover the different assets between small and medium businesses and larger corporations. Before you are able to create these security standards, you must first...
  13. protectaccount

    IT & Software CISCO IT Security Makeover | Cybrary

    Course Description Module 1 Watch as Cisco’s own Mike Storm, a Distinguished Cybersecurity Engineer, explores the dynamic partnership between AGS, a Cisco partner and managed services provider, and TD Tech Solutions, a Cisco distributor to protect an orthodontics office in Michigan from...
  14. protectaccount

    IT & Software Cyber Network Security | Cybrary

    The course will cover fundamental knowledge of the incident response process and business continuity planning. Students will also learn about malware, common attack vectors, and learn to use Windows firewall. Prerequisites This course is designed for beginners who have little or no knowledge...
  15. protectaccount

    IT & Software Network Troubleshooting and Tools | Cybrary

    After this troubleshooting is completed, we will also look at how to verify other network connectivity issues such as domain name resolution, route tables, and how to test ports and protocols. The course will also cover what advanced network troubleshooting tools are available outside the...
  16. protectaccount

    IT & Software Intermediate Data Security | Cybrary

    In this course you will learn about the Payment Card Industry Data Security Standards, including types of PCI data, what to secure, the PCI 3 step process, assessments, and reporting. This course will also discuss Personal Health Information, going over rules and regulations and HIPAA. Lastly...
  17. protectaccount

    IT & Software Check Point Jump Start: Maestro Hyperscale Network Security | Cybrary

    Check Point Maestro introduces to the industry a new way to utilize current hardware investment and maximize appliance capacity in an easy-to-manage Hyperscale network security solution. With Maestro, organizations can simplify their workflow orchestration and scale up their existing Check...
  18. protectaccount

    IT & Software Learning Path: 12 Competencies of the Effective CISO | Cybrary

    12 Competencies of the Effective CISO ————————————- Learn the technical, management, and business competencies required to become an effective CISO in the 21st century Dr. Edward G. Amoroso, CEO of TAG Cyber and former CISO of AT&T develops insights into the twelve technical, management, and...
  19. protectaccount

    IT & Software AlienVault OSSIM | Cybrary

    This course will use AlienVault OSSIM to showcase a Security Information and Event Management (SIEM) system. A SIEM is used to aggregate logs for all sources in a network, analyze the logs through a correlation engine, and generating alarms on malicious indicators and activity. Link: *** Hidden...
  20. protectaccount

    IT & Software Cybrary it Certificate of Cloud Security Knowledge CCSK-SNYLK

    This course prepares you to take the Certificate of Cloud Security Knowledge (CCSK) certification by covering material included in the exam. It explains how the exam can be taken and how CCSK certification process works. Link: *** Hidden text: You do not have sufficient rights to view the hidden...
  21. protectaccount

    IT & Software Intro to Malware Analysis and Reverse Engineering | Cybrary

    In this Malware analysis course you will learn how to perform dynamic and static analysis on all major files types, how to carve malicious executables from documents and how to recognize common malware tactics and debug and disassemble malicious binaries. Link: *** Hidden text: You do not have...
  22. protectaccount

    IT & Software Incident Response and Advanced Forensics Cybrary

    In this course, you will gain an introduction to Incident Response, learn how to develop three important protection plans, perform advanced forensics on the incident, deep dive into insider and malware threats, and commence incident recovery. Link: *** Hidden text: You do not have sufficient...
  23. protectaccount

    IT & Software Building an InfoSec Lab | Cybrary

    This course will guide you through the basics of incorporating several Information Security Engineering Tools in your home and/or lab. By building this lab you will be able to obtain corporate-level security within your home network, as well as a higher understanding of the capabilities and...
  24. protectaccount

    IT & Software NIST 800-53: Introduction to Security and Privacy Controls | Cybrary

    In this course, we will learn how 800-53 fits into the Risk Management Framework (RMF) since the knowledge is fundamental to understanding the importance of the security controls. After studying the steps in RMF, students will discover the history of the 800-53 document based on the revisions to...
  25. protectaccount

    IT & Software Secure Coding | Cybrary

    In the Secure Coding training course, Sunny Wear will show you how secure coding is important when it comes to lowering risk and vulnerabilities. Learn about XSS, Direct Object Reference, Data Exposure, Buffer Overflows, & Resource Management. Link: *** Hidden text: You do not have sufficient...
  26. protectaccount

    IT & Software Cybrary – CompTIA CySA+

    The CompTIA Cybersecurity Analyst (CySA+) traing is designed to help prepare candidates to sit for the CySA+ exam, as well as reinforce concepts for work roles such as Systems Security Analyst, Threat Analyst, and Vulnerability Assessment Analysts. Link: *** Hidden text: You do not have...
  27. protectaccount

    IT & Software Cybrary – Certified Information Systems Security Professional (CISSP)

    CISSP certification verifies one has mastery of a multitude of information assurance and cyber security topics, something that’s necessary for IT management and leadership (a job that many CISSP holders fulfill). Our online CISSP training covers topics ranging from operations security...
  28. protectaccount

    IT & Software Intro to Infosec | Cybrary

    Cybrary’s introduction to information security is intended for everyone interested in a career in cybersecurity. Learn the basics, then launch your new career by continuing with our CompTIA A+, Network+, or Security+ Courses. Link: *** Hidden text: You do not have sufficient rights to view the...
  29. protectaccount

    IT & Software Secure Development, Programming, and Coding with Veracode | Cybrary

    Learn about important secure coding methodologies including CRLF Injection, Directory Traversal, Information Leakage, Open Redirects, OS Command Injection, SQL Injection and Cross-site Scripting Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
  30. protectaccount

    IT & Software Microsoft Active Directory Domain Services | Cybrary

    Module 2 explains how to implement virtualized domain controllers and read-only domain controller (RODCs) Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text...
  31. protectaccount

    IT & Software IT Governance and Management | Cybrary

    What does CISA Domain 2 cover? Domain 2 of the CISA surrounds the governance and management of IT, with included topics ranging from IT monitoring and assurance practices. Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  32. protectaccount

    IT & Software Getting Started with Palo Alto Networks | Cybrary

    In this course brought to you by Palo Alto Networks, you will learn how to set up the famous Palo Alto Firewall as well as how to secure said network through SSH and SSL Decryption and IPSec VPN Setup. Come learn today why Palo Alto Networks leads the security industry. Link: *** Hidden text...
  33. protectaccount

    IT & Software Fortinet Fortigate Cookbook | Cybrary

    The Fortinet Cookbook course contains step-by-step examples of how to integrate Fortinet products into your network and apply features such as security profiles, wireless networking, and VPN. Using the Cookbook, you can go from idea to execution in simple steps, configuring a secure network for...
  34. protectaccount

    IT & Software Network Architecture | Cybrary

    In the Network Architecture Course by Michael Redman, students will get a thorough deep dive into network architecture, focusing on core concepts that will help them pass the Network+ exam. You will learn about network models, cabling, and technology. Link: *** Hidden text: You do not have...
  35. protectaccount

    IT & Software Access Control and Identity Management | Cybrary

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  36. protectaccount

    IT & Software Courses ISC2 Certified Secure Software Life-cycle Professional (CSSLP) | Cybrary

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. protectaccount

    IT & Software Courses Chief Information Security Officer (CISO) | Cybrary

    In this CISO certification training, you will learn what other CISO’s are focusing their time and attention on. Among the key topics, you will learn how to implement the proven best practices that make for successful cyber security leadership. Link: *** Hidden text: You do not have sufficient...
  38. protectaccount

    IT & Software CompTIA Cloud+ | Cybrary

    Our online Cloud+ training addresses the essential knowledge for implementing, managing and maintaining cloud technologies as securely as possible. It covers cloud concepts and models, virtualization, and infrastructure in the cloud. Link: *** Hidden text: You do not have sufficient rights to...
  39. protectaccount

    IT & Software Intro to Malware Analysis and Reverse Engineering | Cybrary

    In this Malware analysis course you will learn how to perform dynamic and static analysis on all major files types, how to carve malicious executables from documents and how to recognize common malware tactics and debug and disassemble malicious binaries. Link: *** Hidden text: You do not have...
  40. protectaccount

    IT & Software Web Application Penetration Testing | Cybrary

    In this course, SME, Raymond Evans, takes you on a wild and fascinating journey into the cyber security discipline of web application pentesting. This is a very hands-on course that will require you to set up your own pentesting environment. Link: *** Hidden text: You do not have sufficient...
  41. protectaccount

    IT & Software NMAP | Cybrary

    The network mapper (NMAP) is one of the highest quality and powerful free network utilities in the cybersecurity professional’s arsenal. Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  42. protectaccount

    IT & Software Incident Response and Advanced Forensics | Cybrary

    In this course, you will gain an introduction to Incident Response, learn how to develop three important protection plans, perform advanced forensics on the incident, deep dive into insider and malware threats, and commence incident recovery. Link: *** Hidden text: You do not have sufficient...
  43. protectaccount

    IT & Software Post Exploitation Hacking | Cybrary

    In this self-paced online training course, you will cover three main topics: Information Gathering, Backdooring and Covering Steps, how to use system specific tools to get general information, listener shells, metasploit and meterpreter scripting. Link: *** Hidden text: You do not have...
  44. protectaccount

    IT & Software Microsoft Certified Solutions Associate (MCSA) Certification | Cybrary

    Our self-paced online Microsoft Certified Solutions Associate (MCSA) certification training course will teach you all you need to know for the certification exam: how to configure file and print services, how to deploy, manage and maintain Microsoft servers, among other relevant topics. Link...
  45. protectaccount

    IT & Software Kali Linux Fundamentals | Cybrary

    In this Kali Linux training course you will learn about the industry standard tool for penetration and security testing. Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the...
  46. protectaccount

    IT & Software Regex | Cybrary

    In this course you’ll learn the basics of regular expressions, also known as Regex. As a professional you will understand when it is beneficial to use Regex and when it’s not, how to construct Regex, and how to read Regex built by other professionals. Link: *** Hidden text: You do not have...
  47. protectaccount

    IT & Software Introduction to General Data Protections | Cybrary

    The General Data Protection Regulations (GDPR) are the new regulations governing the processing of personal data for citizens and residents in the European Union (EU). This course will provide an overview of those regulations Link: *** Hidden text: You do not have sufficient rights to view the...
  48. protectaccount

    IT & Software CompTIA CySA+ | Cybrary

    The CompTIA Cybersecurity Analyst (CySA+) traing is designed to help prepare candidates to sit for the CySA+ exam, as well as reinforce concepts for work roles such as Systems Security Analyst, Threat Analyst, and Vulnerability Assessment Analysts. Link: *** Hidden text: You do not have...
  49. protectaccount

    IT & Software Axelos ITIL Foundations | Cybrary

    This ITIL Foundation training course is for beginners and provides baseline knowledge for IT service management. It is taught by Daniel Reilly, one of our many great cyber security knowledge instructors whom contribute to our digital library. Link: *** Hidden text: You do not have sufficient...
  50. protectaccount

    IT & Software Axelos ITIL Foundations | Cybrary

    This ITIL Foundation training course is for beginners and provides baseline knowledge for IT service management. It is taught by Daniel Reilly, one of our many great cyber security knowledge instructors whom contribute to our digital library. Link: *** Hidden text: You do not have sufficient...
Top Bottom