This course delves into the intricate aspects of asset security, providing IT professionals with essential knowledge aligned with the CISSP curriculum. It begins by exploring asset and data classification, helping you understand the importance of categorizing organizational resources based on sensitivity and value. From there, you'll learn about data and asset handling … [Read more...] about Asset Security
Computer Security and Networks
An Introduction to Ethical Hacking with Kali Linux
Learn ethical hacking through Kali Linux, one of the leading computer security operating systems, and discover how to gather information, detect vulnerabilities, and exploit them using tools in Kali Linux. This course will equip you with the necessary tools to test your own servers and applications for vulnerabilities. As computer security is one of the fastest-growing fields … [Read more...] about An Introduction to Ethical Hacking with Kali Linux
Offensive Hacking Unfolded – Become a Pro Pentester
In this course, you'll learn to install VMware and create a virtual environment with both hacker and target labs. You'll master advanced information gathering and reconnaissance in both active and passive modes, and receive templates and guides for professionally storing data. Using this data: - You'll conduct vulnerability assessments and leverage the Metasploit framework for … [Read more...] about Offensive Hacking Unfolded – Become a Pro Pentester
Incident Response, Risk Management, and Compliance
In an era of evolving cyber threats, mastering incident response, risk management, and compliance is essential for protecting organizations. This course provides an in-depth exploration of cybersecurity governance, attack detection, and security frameworks, preparing you to manage incidents, assess risks, and ensure regulatory compliance. You'll gain hands-on insights into … [Read more...] about Incident Response, Risk Management, and Compliance
FortiManager Administrator
In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard … [Read more...] about FortiManager Administrator