Network & Security
Data Center Infrastructure & Design: Fire Fighting Design, Data Center Fire Infrastructure/Data Center Infrastructure Essentials/Datacenter Systems/Data Center Fire Systems Design.
Course ...
ISO 27001 Certification Process – A Step-by-Step Guide, Master ISO 27001: Achieve Certification, Build Security, and Ensure Compliance for Your Organization.
Course Description
Unlock the ...
SQLMap From Scratch for Ethical Hackers, Learn SQLMap for Ethical Hacking: Explore Automated SQL Injection Testing, Advanced Techniques, Real-World Applications.
Course Description
Welcome to ...
AI Cybersecurity Solutions: Overview of Applied AI Security, Learn to identify, analyze, and mitigate GenAI threats using modern security playbooks.
Course Description
AI security is no ...
Threat Modeling for Agentic AI: Attacks, Risks, Controls, Learn how agent architectures fail in practice and how to model, detect, and stop cascading risks.
Course Description
Modern AI ...
ISO 27001:2022 for Emerging Technologies, Apply ISO 27001:2022 to AI, IoT, Cloud & Blockchain with Risk Mapping, Control Selection, and Audit Preparation.
Course Description
This ...
ISO 42001 Annex A Controls Explained, Master ISO/IEC 42001 Annex A controls with practical examples, governance checklists, audits, and responsible AI.
Course Description
This course ...
ISO 27001 & NIST Integration: Unified Information Security, Learn how to integrate ISO 27001 with NIST CSF and SP 800-53 to build efficient, audit-ready information security.
Course Description
...
Employee CyberSecurity Awareness First Line of Defense, Knowledge that every employee must have. Learn how to protect your company data from hackers and unauthorized access.
Course Description
...
Cracking Microsoft Office files Passwords | Ethical Hacking, Crack passwords for Word, Excel and PowerPoint files on Windows and on Kali Linux.
Course Description
*The ultimate Practical Password ...
Ethically Hack the Planet Part 4, Secure the world.
Course Description
Are you ready to embark on a thrilling journey through the realm of ethical hacking and cybersecurity, all while exploring ...
- 1
- 2
- 3
- …
- 87
- Next Page »
