• Exclusive

    Hey Guest, unlock an instant 10% bonus discount when you upgrade via the Crypoverse gateway.

  1. protectaccount

    IT & Software Network Traffic Analysis for Incident Response by InfoSec | LinkedIn

    Explore essential tools and techniques for handling network security. Unlock the potential of Wireshark to garner insights into traffic patterns and threats. Investigate common network threats in-depth, such as data exfiltration and multistage malware, following practical case studies. Discover...
  2. protectaccount

    IT & Software Infosec Institute Siterip Part 4

    Bridging the cybersecurity skills gaps at your organization is like balancing an equation. You can’t have security without first investing in your employees’ cybersecurity skills. From security awareness and training for accounting to secure coding training for engineering, we have the right...
  3. protectaccount

    IT & Software Infosec Institute Siterip Part 2

    Bridging the cybersecurity skills gaps at your organization is like balancing an equation. You can’t have security without first investing in your employees’ cybersecurity skills. From security awareness and training for accounting to secure coding training for engineering, we have the right...
  4. protectaccount

    IT & Software Infosec Institute Siterip Part 3

    Bridging the cybersecurity skills gaps at your organization is like balancing an equation. You can’t have security without first investing in your employees’ cybersecurity skills. From security awareness and training for accounting to secure coding training for engineering, we have the right...
  5. protectaccount

    IT & Software Infosec Institute Siterip Part 1

    Bridging the cybersecurity skills gaps at your organization is like balancing an equation. You can’t have security without first investing in your employees’ cybersecurity skills. From security awareness and training for accounting to secure coding training for engineering, we have the right...
  6. protectaccount

    IT & Software Infosec – Introduction to Incident Response

    Get on overview of incident response, including how to respond to security incidents and common incident response definitions and concepts. The tide of cybercrime is rising, and incident response and network forensics are needed more than ever. Two videos introduce you to incident response...
  7. protectaccount

    IT & Software Incident Response Path | InfoSec

    Incident Response training This learning path starts with a high-level discussion of what happens at each phase of responding to an incident, followed by a technical deep dive into some of the more exciting parts of memory, network and host analysis and forensics. This learning path is for...
  8. protectaccount

    IT & Software Paraben P2C Operator Certification Path | InfoSec

    Learn Paraben E3 Forensic Platform Digital forensics is a broad term for a very specialized skill set that is required to produce digital information in a forensic-grade manner. Forensic-grade is all about having data that can have proved integrity to its origin and quality. Within the process...
  9. protectaccount

    IT & Software Cloud Service Provider (CSP) Security Features Path | InfoSec

    Learn CSP Security Features Explore the ins and outs of choosing and working with AWS, Azure and GCP. For each cloud provider, we will review the native security controls they offer across several security domains, discuss the drawbacks of each cloud provider and look at areas to consider when...
  10. protectaccount

    IT & Software Python for Cybersecurity Path | InfoSec

    Gain practical experience and develop your secure Python coding skills through 10 hands-on labs in the Python Code Security Cyber Range. Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient...
  11. protectaccount

    IT & Software Cloud Service Provider (CSP) Security Features Path | InfoSec

    Learn CSP Security Features Explore the ins and outs of choosing and working with AWS, Azure and GCP. For each cloud provider, we will review the native security controls they offer across several security domains, discuss the drawbacks of each cloud provider and look at areas to consider when...
  12. protectaccount

    IT & Software Python for Cybersecurity Path | InfoSec

    Gain practical experience and develop your secure Python coding skills through 10 hands-on labs in the Python Code Security Cyber Range. Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient...
  13. protectaccount

    IT & Software Python for Pentesters Path | InfoSec

    Learn Python for pentesting In this learning path, we will begin by covering the basics of Python programming. This includes variables, loops, conditionals, exception handling and more. Next, we will explore some of the common vulnerabilities that Python can exploit. Moving on from common...
  14. protectaccount

    IT & Software Secure Linux/UNIX Path | InfoSec

    Our Certified Information Privacy Professional/Europe (CIPP/E) boot camp provides data protection officers (DPOs) and other professionals in privacy and data protection roles with comprehensive knowledge and understanding of the European Union General Data Protection Regulation (GDPR), European...
  15. protectaccount

    IT & Software Secure Linux/UNIX Path | InfoSec

    Securing Linux/UNIX training Explore the many challenges of securing the Linux operating system. We’ll look at Linux users and groups, network security, port scanning, running daemons as a regular user versus running as root, and everything to do with sudo. We will also dig into the details of...
  16. protectaccount

    IT & Software Infosec – Access Control Fundamentals

    Take a deep dive into one of the fundamental concepts of security: access control. Learn how to give the right people access to the right information in a secure way. Twenty-two videos cover everything you want to know about access control fundamentals. Beginning with access control basics...
  17. protectaccount

    IT & Software Data Science and Machine Learning for Infosec | Pentester Academy

    The age of intelligent machines is here! We are now seeing Machine Learning disrupting every technological field including computer security. As more and more security products use Machine Learning, it is important as Pentesters and Security Researchers to understand how to make and break this...
  18. protectaccount

    IT & Software (ISC)² CISSP Fundamentals | Infosec

    The learning path is divided into courses corresponding to the eight domains of the CISSP CBK. Each course contains videos and short quizzes on foundational topics (or sets of topics) within the domain. The quizzes go beyond the material covered in videos to introduce other topics covered in the...
  19. protectaccount

    IT & Software Building an InfoSec Lab | Cybrary

    This course will guide you through the basics of incorporating several Information Security Engineering Tools in your home and/or lab. By building this lab you will be able to obtain corporate-level security within your home network, as well as a higher understanding of the capabilities and...
  20. protectaccount

    IT & Software Mobile Forensics Fundamentals | Infosec

    The content of the learning path is divided into Courses corresponding to four domains of Mobile Forensics. The Courses focus on the foundation topics within the domains. Each Course has streaming content for the designated topics. Link: *** Hidden text: You do not have sufficient rights to...
  21. protectaccount

    IT & Software Information Security Auditing | Infosec

    This learning path builds a foundation of skills around information security auditing. As you progress through 17 courses, you’ll learn how to audit many different aspects of an organization, including business system application and development, disaster recovery and continuity planning...
  22. protectaccount

    IT & Software CompTIA Cloud+ | Infosec

    This learning path prepares you to earn your Cloud+ certification. You’ll learn the basics of system requirements, cloud storage, security, troubleshooting as you progress through 9 courses tied to the Cloud+ certification exam objectives. Upon completion, you’ll have a foundation of knowledge...
  23. protectaccount

    IT & Software Computer Incident Response | Infosec

    Active Directory with Windows Server 2016 training This learning path teaches you all about managing identities in Active Directory. As you progress through five courses, you’ll learn how Active Directory simplifies requirements to meet security policies and interconnection management, how to...
  24. protectaccount

    IT & Software Active Directory with Windows Server 2016 | Infosec

    Active Directory with Windows Server 2016 training This learning path teaches you all about managing identities in Active Directory. As you progress through five courses, you’ll learn how Active Directory simplifies requirements to meet security policies and interconnection management, how to...
  25. protectaccount

    IT & Software Certified Computer Security Incident Handler (CSIH) | Infosec

    Certified Computer Security Incident Handler training This learning path goes in-depth into cyber incident response and prepares you to pass the CERT-Certified Computer Security Incident Handler (CSIH) exam. As you progress through 20 courses tied to five the CSIH domains, you’ll learn how to...
  26. protectaccount

    IT & Software CPUs | Infosec

    Get to grips with the details of central processing units, or CPUs, with this course covering CPU cores, caching, sockets and more. What is a CPU, and what should you know about it? Dive into the details of the central processing unit with this course. You’ll cover CPUs and cores, caching...
  27. protectaccount

    IT & Software Blockchain in Action | Infosec

    This course discusses attacks that target the block creation process and the nodes and networks that make up the blockchain ecosystem. After understanding the different components of the blockchain, it is possible to discuss its security as a whole. This course investigates how blocks are...
  28. protectaccount

    IT & Software Breaking Password Security | Infosec

    “Some passwords are just too secure to bother to break.” And some are easy pickings. Ethical hackers in training will appreciate this three-video course on the fundamentals of breaking password security, including multiple approaches to breaking passwords, techniques such as brute-forcing...
  29. protectaccount

    IT & Software Backup and Recovery | Infosec

    In case of disaster, encryption or other malady, you can use the different types of Windows backups to bring your data back as soon as possible to your Windows 10 hosts. Did you know there are two types of backups in Windows 10? Only one of them can allow you to restore your entire hard drive...
  30. protectaccount

    IT & Software All Learning Path from InfoSec 2020 + PDFs + Files Part 4

    All Learning Path from InfoSec 2020 + PDFs + Files + screenshots of cyber ranges – PART 4 In part 4: ========== Networking Fundamentals Network Security Fundamentals Network Traffic Analysis for Incident Response NIST CSF Fundamentals NIST Cybersecurity Framework NIST DoD RMF NIST DOD RMF...
  31. protectaccount

    IT & Software All Learning Path from InfoSec 2020 + PDFs + Files Part 1

    All Learning Path from InfoSec 2020 + PDFs + Files + screenshots of cyber ranges – PART 1 In part 1: ========== Active Directory with Windows Server 2016 Advanced Cybersecurity Concepts AWS Essentials & Solutions Architect Associate Blockchain Security CERT-Certified Computer Security Incident...
  32. protectaccount

    IT & Software All Learning Path from InfoSec 2020 + PDFs + Files Part 2

    All Learning Path from InfoSec 2020 + PDFs + Files + screenshots of cyber ranges – PART 2 [Webrip 1080p (mp4)] In part 2: ========== CompTIA PenTest+ CompTIA Security+ CompTIA Security+ Fundamentals Computer Forensics Computer Incident Response Countermeasures Cybersecurity Administration...
  33. protectaccount

    IT & Software All Learning Path from InfoSec 2020 + PDFs + Files Part 3

    All Learning Path from InfoSec 2020 + PDFs + Files + screenshots of cyber ranges – PART 3 In part 3: ========== IACRB Certified Reverse Engineering Analyst (CREA) IACRB Certified SCADA Security Architect (CSSA) IACRB CREA Fundamentals IACRB Cyber Threat Hunting Fundamentals IACRB Mobile Web...
  34. protectaccount

    IT & Software Secure Software Development Life Cycle (SDLC) | InfoSec

    The Secure SDLC learning path is a step-by-step approach to integrate the security controls into your software or system development life cycle. You will learn how to use each phase to develop or establish both proactive and reactive security controls across your organization. You can also learn...
  35. protectaccount

    IT & Software Intro to Infosec | Cybrary

    Cybrary’s introduction to information security is intended for everyone interested in a career in cybersecurity. Learn the basics, then launch your new career by continuing with our CompTIA A+, Network+, or Security+ Courses. Link: *** Hidden text: You do not have sufficient rights to view the...
  36. protectaccount

    IT & Software Infosec – Attacking Web Application Access Controls

    Learn to attack web application access controls with this course on attacking access control, attacking authentication, attacking session management and more. Doors are dangerous: even the best-protected door is still a hole in the perimeter that an attacker can slip through. Access controls...
  37. protectaccount

    IT & Software Attacking Web Application Access Controls Infosec

    Learn to attack web application access controls with this course on attacking access control, attacking authentication, attacking session management and more. Doors are dangerous: even the best-protected door is still a hole in the perimeter that an attacker can slip through. Access controls...
  38. protectaccount

    IT & Software Architectural Concepts & Design Requirements | Infosec

    Brush up on your knowledge of architectural concepts and design requirements with this in-depth course. Review cloud service models, characteristics, deployment models, security and more. This in-depth course will take you on a refresher through the details of architectural concepts and design...
Top Bottom