Network & Security
Securing GenAI Systems: Best Practices. Building a Secure GenAI System: Scalable, Robust, and User-Friendly Security Strategies.
Course Description
In a world where Generative AI systems ...
Burp Suite Mastery: From Beginner to Advanced, Master Burp Suite: Learn to Identify and Exploit Web Vulnerabilities from Scratch.
Course Description
Unlock the secrets of web security with ...
Auditing ISO 27001:2022 – Organizational Controls, Master the audit of governance, risk, compliance, and supplier controls in ISO 27001 Annex A Clause 5 – with checklists.
Course Description
...
Intro to European Digital Operational Resilience Act (DORA). Mastering DORA Compliance: Building Resilient Financial Operations.
Course Description
In today’s rapidly evolving financial ...
Learn Web Application Security For Beginners- OWASP Top 10, Learn OWASP top 10 Cyber Security attacks. Use Penetration Testing as an ethical hacker to secure Web applications.
Course Description
...
GenAI Cybersecurity Solutions: OWASP Top 10 for LLM Apps, Secure Generative AI Apps: Learn concepts and explore practical such as prompt injection, insecure output handling etc..
Course Description
...
Cloudflare WAF for DevSecOps, & Cloud Security Engineers, Mastering Threat Mitigation, Custom Rules, and API Protection for Modern DevOps Pipelines.
Course Description
Cloudflare WAF ...
Cybersecurity Stories. Learn from real-world experience., Cybersecurity podcasts for all levels. Learn through real-world stories and expert discussions..
Course Description
Are you ...
Network Security Foundations: Securing Data and Devices, A comprehensive guide to securing networks, preventing attacks and safeguarding digital infrastructure..
Course Description
...
ISO 27001:2022 For Small Businesses, Achieve ISO 27001:2022 Certification: Secure Your Small Business with Expert Guidance.
Course Description
Unlock the secrets to securing your small business ...
Advanced Wireshark for Threat Hunting and Network Forensics, Mastering Advanced Wireshark for Proactive Threat Hunting, C2 Detection, and Actionable Digital Evidence Collection.
Course Description
...
- « Previous Page
- 1
- …
- 12
- 13
- 14
- 15
- 16
- …
- 87
- Next Page »
