• Exclusive

    Hey Guest, unlock an instant 10% bonus discount when you upgrade via the Crypoverse gateway.

  1. protectaccount

    IT & Software Peripheral Devices and Connectors | Cybrary

    A peripheral device or auxiliary device, is generally defined as any device that connects to and works with the computer in some way Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to...
  2. protectaccount

    IT & Software TCP/IP | Cybrary

    The communication standard that devices use to exchange data across the internet Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. protectaccount

    IT & Software Open Systems Interconnection model (OSI model) | Cybrary

    The OSI Model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology Link: *** Hidden text: You do not have sufficient rights to view the hidden text...
  4. protectaccount

    IT & Software Security Operations | Cybrary

    They are responsible for knowing where a network’s possible vulnerabilities are and providing mitigation strategies to combat them. An effective Cyber Security Operations Manager will have experience in a technical security role including … Link: *** Hidden text: You do not have sufficient...
  5. protectaccount

    IT & Software Security Engineering | Cybrary

    Domain 3 covers engineering and management of security. Why do I need this certification? Security engineering is a field which requires cross-disciplinary knowledge in areas such as cryptography and site design security Link: *** Hidden text: You do not have sufficient rights to view the hidden...
  6. protectaccount

    IT & Software Fundamentals of Cybersecurity Architecture | Cybrary

    This cyber security architecture class aims to give an appreciation of the various aspects of consideration that goes into a proper security architecture. Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. protectaccount

    IT & Software Network Fundamentals Using GNS3 | Cybrary

    This course will enable students to install and configure a basic GNS3 network lab that could later be used for other networking courses such as ICND1 and ICND2. GNS3 is an open source, free software option for graphical network simulations that support a variety of vendor devices. Link: ***...
  8. protectaccount

    IT & Software Introduction to Splunk | Cybrary

    This Splunk training class is designed to quickly introduce you to Splunk and its many capabilities. Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the...
  9. protectaccount

    IT & Software Cryptography | Cybrary

    The art of writing or solving codes. Why do I need this certification? Our online lifestyle requires governments, the military, corporations, and consumers to properly protect their information from prying eyes Link: *** Hidden text: You do not have sufficient rights to view the hidden text...
  10. protectaccount

    IT & Software IDS/IPS | Cybrary

    Two common security appliances are IPS and IDS. IPS stands for Intrusion Prevention System and IDS stands for Intrusion Detection System Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. protectaccount

    IT & Software Developing Ethical Hacking Tools with Python | Cybrary

    In this course you will learn to develop your own tools in Python, that will help you in your cybersecurity assessments. Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. protectaccount

    IT & Software Introduction to IT & Cybersecurity | Cybrary

    In this FREE IT and cybersecurity training for beginners, you will learn about the four primary disciplines of information technology (IT) and cybersecurity. This introduction to IT course is designed to help you decide which career path is right for you. Link: *** Hidden text: You do not have...
  13. protectaccount

    IT & Software Lean Six Sigma Yellow Belt | Cybrary

    This online Lean Six Sigma Yellow Belt course teaches you how and where to apply the Lean and Six Sigma process improvement methodologies. Once completed, you will have the knowledge to pass the Six Sigma Yellow Belt certification exam. Link: *** Hidden text: You do not have sufficient rights to...
  14. protectaccount

    IT & Software SQL Injection | Cybrary

    This course will cover a brief introduction to databases and SQL commands, basic information about Web applications, and basic information about SQL Injection attacks. Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text...
  15. protectaccount

    IT & Software Footprinting and Reconnaissance | Cybrary

    This course will cover common tools used during the footprinting and reconnaissance phase of the ethical hacking testing methodology. Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  16. protectaccount

    IT & Software Guide to the Tor Browser | Cybrary

    This is a comprehensive Tor Browser guide to getting through the mystique of the Tor Browser including, but not limited to: major misconceptions, installation, history, strengths and weaknesses, discussions on onion addresses, and ending on a comparison of the Deep Web and Dark Web. Link: ***...
  17. protectaccount

    IT & Software CRISC | Cybrary

    This course on Certified in Risk and Information Systems Control is for IT and business professionals who develop and maintain information system controls, and whose job revolves around security operations and compliance. Link: *** Hidden text: You do not have sufficient rights to view the...
  18. protectaccount

    IT & Software Enterprise Project Management | Cybrary

    In this Enterprise Project Management (EPM) training course, students will learn the fundamentals of managing projects at an enterprise level, including connecting previous project management knowledge to leadership’s vision and mission for the project. Course Description Enterprise Project...
  19. protectaccount

    IT & Software AZ-900 Microsoft Azure Fundamentals | Cybrary

    In this online Microsoft Azure Fundamentals training course, students will learn basic cloud computing concepts and how these concepts are applied specifically to Microsoft Azure. Upon completion, students will be prepared to take the AZ-900 certification exam. Link: *** Hidden text: You do not...
  20. protectaccount

    IT & Software Introduction to IT Security Policy | Cybrary

    Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization. Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  21. protectaccount

    IT & Software Cloud Architecture Foundations | Cybrary

    In this Cloud Architecture training, students learn the basics of cloud computing across three platforms – Amazon Web Services (AWS), Microsoft Azure, and Google Cloud. This class provides students with hands-on training and excellent instruction. Link: *** Hidden text: You do not have...
  22. protectaccount

    IT & Software Windows Forensics and Tools | Cybrary

    The Windows Forensics and Tools course focuses on building digital forensics knowledge of Microsoft Windows operating systems, as well as some compatible software or tools that can be used to obtain or process information in such systems. Link: *** Hidden text: You do not have sufficient rights...
  23. protectaccount

    IT & Software HIPAA Training | Cybrary

    This online HIPAA Training is designed to introduce students to the Health Insurance Portability and Accountability Act (HIPAA). HIPAA is a U.S. healthcare law that was first passed in 1996. In this course, we will cover what HIPAA is, why it is important, and the key takeaways your organization...
  24. protectaccount

    IT & Software Security Onion | Cybrary

    Security Onion is an open source Network Security Monitoring and log management Linux Distribution. In this course we will learn about the history, components, and architecture of the distro, and we will go over how to install and deploy single and multiple server architectures, as well as how...
  25. protectaccount

    IT & Software Insider Threats | Cybrary

    This insider threat training course provides review of the “insider threat”. Discussed will be subjects related to people, tools, technology, and processes employed to prevent, detect and respond to the insider attack. This course will enable a student to confidently discuss “insider threat”...
  26. protectaccount

    IT & Software Analyzing Attacks for Incident Handlers | Cybrary

    In Analyzing Attacks for Incident Handlers, David Biser explains memory analysis and how to use it to uncover information about a computer. He demonstrates this process of analyzing an attack using labs such as a Redline lab and a VM and Malware lab to conduct an analysis on a computer. Link...
  27. protectaccount

    IT & Software Networking Fundamentals for Security Practitioners | Cybrary

    In this course, you will learn the fundamentals of networking through the lens of a security practioner. More specifically, we will cover topics like network protocols, architecture, devices, and topology, which are vital for any entry level IT/Security professional. Link: *** Hidden text: You...
  28. protectaccount

    IT & Software Linux Fundamentals for Security Practitioners | Cybrary

    Linux Fundamentals for Security Practitioners provides an overview on how to properly configure a Linux OS to provide a secure computing environment for end users. We’ll cover a combination of materials, focusing on Linux architecture, permissions, commands, directories, and shells to achieve a...
  29. protectaccount

    IT & Software pfSense: Installing and Configuring the Firewall | Cybrary

    PfSense is a is a free commercial firewall solution that users are able to customize based on their organization’s needs to create a solution that is tailored to those needs. PfSense can repurpose an old computer into a fully featured router and firewall. Link: *** Hidden text: You do not have...
  30. protectaccount

    IT & Software IoT Security | Cybrary

    This IoT Security training is designed to help IT professionals strengthen their knowledge about the Internet of Things (IoT) and the security platforms related to it. You’ll also be able to identify the security, privacy and safety concerns related to the implementation of an IoT...
  31. protectaccount

    IT & Software CCDA (Cisco Certified Design Associate) | Cybrary

    In this course you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification. Course Description Wireless networks are designed and implemented for a wide array of functions: Internet access, data centers, organizational security...
  32. protectaccount

    IT & Software CCDA (Cisco Certified Design Associate) | Cybrary

    In this course you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification. Course Description Wireless networks are designed and implemented for a wide array of functions: Internet access, data centers, organizational security...
  33. protectaccount

    IT & Software Fundamentals of Risk Policies and Security Controls | Cybrary

    In this course, you’ll learn various controls that need to be put in place to ensure that CIA triad of security is maintained while running a business. With threat expanding with time and more advanced attacks and data breaches being discovered, it is important for organizations to have proper...
  34. protectaccount

    IT & Software Incident Response Recovery | Cybrary

    Incident Response Recovery covers the actual recovery process from an incident that was identified and managed. It goes over the proper documentation necessary after the incident is handled, the legal concerns associated with the incident, and the lessons learned. Link: *** Hidden text: You do...
  35. protectaccount

    IT & Software Online Reconnaissance | Cybrary

    In Online Reconnaissance, Ken Underhill goes over the gathering of data through reconnaissance-related labs, with a primary focus on open-source intelligence (OSINT). He walks you through a social media profile analysis lab and a whois lab to give you a hands-on overview of information...
  36. protectaccount

    IT & Software Threat Hunting with Windows Event Forwarding | Cybrary

    In this course we will learn about an approach to collect events from windows devices in both normal operations and when an intrusion is suspected. We will use Windows Event Forwarding (WEF) natively built into Windows for Incident detection while sharing our learnings and step-by- step...
  37. protectaccount

    IT & Software Secure Coding Fundamentals | Cybrary

    In Secure Coding Fundamentals, Ayokunle Olaniyi takes you through the best coding practices, which ensures that the application developed as a result stick to the CIA triad and are not riddled by the OWASP top 10. Various aspects of code security and risk assesments across the OWASP top 10 are...
  38. protectaccount

    IT & Software Intro to Powershell Scripting | Cybrary

    In this course, you will learn the fundamentals of Microsoft Powershell, which is a popular task automation and configuration management framework. In this course you will learn the basics of the tool, to get started scripting today! Link: *** Hidden text: You do not have sufficient rights to...
  39. protectaccount

    IT & Software Getting Started in Security Analytics with CyberEASY | Cybrary

    This course focuses on the current perspective of cybersecurity analytics contrasted with the emerging trends over threat hunting and threat intelligence. The course will show the role of CyberEASY on threat intelligence and threat hunting and how CyberEASY can help the organization to better...
  40. protectaccount

    IT & Software Endpoint Security Fundamentals | Cybrary

    This course is about basics in Endpoint Security. In it, you will learn why endpoint security today is of such importance and basic terminology used in this field. Also, you will learn about threats that are existing today related to endpoints and what solutions and tools exist on the market...
  41. protectaccount

    IT & Software CISO Competency – Discretion | Cybrary

    This is the fifth course in Ed Amoroso’s Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Discretion and Trust. The CISO must be able to exhibit and manage high levels of discretion and trust in dealing with sensitive information regarding threats...
  42. protectaccount

    IT & Software CISO Competency – Public Speaking | Cybrary

    This is the sixth course in Ed Amoroso’s Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Public Speaking. As a senior executive, the CISO must have the ability to speak confidently and effectively before groups ranging from large audiences to corporate boards...
  43. protectaccount

    IT & Software Wireless Network Fundamentals for Security Practitioners | Cybrary

    In this course, the instructor covers the basics about wireless protocols which includes LTE, Bluetooth, Z-Qave, and zigbee. The instructor also goes more in-depth with Aircrack-NG by discussing the tools used to test the wifi networks, explaining how to install the tools on various OS, and...
  44. protectaccount

    IT & Software Pentest Fundamentals: Scanning Networks | Cybrary

    In Pentest Fundamentals: Scanning Networks, we explain what scanning is and why its important for a security assessment or maintence. He also discusses NMAP and covers the various types of NMAP techniques to scan a target effectively. Hping, a cmd packet-crafting tool generally used as a network...
  45. protectaccount

    IT & Software Web Defense Fundamentals | Cybrary

    In this course, you will learn the fundamentals of Web Defense and Web Application security, with a focus on the Open Web Application Security Project OWASP Top 10 and how they approach the various vulnerabilities that can be found in said web applications. Link: *** Hidden text: You do not...
  46. protectaccount

    IT & Software Basic Evimetry Deadboot Forensic Acquisition: Wired and Local | Cybrary

    Course Description In this course we will do the more common practice of creating a forensic image on the local computer but managing the entire process across a CAT6 network from the Evimentry Windows Controller. We’ll also revisit writing our forensic images to “blessed” storage media...
  47. protectaccount

    IT & Software CISO Competency – Innovation | Cybrary

    Course Description Course Introduction The Role of Innovation CISO Innovation to Defend Dealing with Failure Case Study on Innovation Guest Interview (Invited): Phil Quade, CISO Fortinet Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. protectaccount

    IT & Software CISO Competency – Finance & Administration | Cybrary

    Course Description Role of Corporate Finance Importance of Competent Administration Predictive Planning and Dealing with Cuts Case Study on Finance and Administration Guest Speaker (invited): Bill O’Hern, SVP/CSO AT&T Link: *** Hidden text: You do not have sufficient rights to view the hidden...
  49. protectaccount

    IT & Software Courses CISO Competency – Security | Cybrary

    Course Description Expectations for CISO Security Expertise Translating Technology to Plain Speak Background, Education, and Training Issues Case Study on Cyber Security Expertise Guest Speaker: David Ortiz, CISO Bed Bath & Beyond Link: *** Hidden text: You do not have sufficient rights to view...
  50. protectaccount

    IT & Software Fortinet FortiWeb Cloud WAF-as-a-Service | Cybrary

    Course Description The course will walk students through setting up their Route 53 domain, setting up an EC2 instance, and creating their Web application. Students will use a custom script (provided in the resources section of the course) to complete their EC2 instance setup. A simple web page...
Top Bottom