Select View:

Python Learning Training

  • Module 1: Introduction to Python
  • Module 2: Python Data Structures
  • Module 3: Functions and Modules
100h
0
0

Excel Training

  • Module 1: Introduction to Excel Essentials
  • Module 2: Data Management and Analysis
  • Module 3: Advanced Formulas and Functions
15h
0
0

Certified Cybersecurity Technician

  • Module 01: Information Security Threats and Vulnerabilities
  • Module 02: Information Security Attacks
  • Module 03: Network Security Fundamentals
40h
3
0

Certified Ethical Hacker

  • Footprinting
  • Network scanning
  • Enumeration
40h
4
0

Certified Network Defender

  • Network Attacks and Defense
  • StrategiesAdministrative Network Security
  • Technical Network Security
0m
1
8

Cyber Hygiene Training

  • What threatens us?
  • Who is attacking and why?
  • The role of individual responsibility
12h
0
7

IS Audit Training

  • Introduction to Information Systems (IS) Auditing
  • Perform IS auditing
  • Business Application Development and the Roles of IS Auditors
0m
0
7

Web Application Security Training

  • Get an overview of web applications and their history, benefits, drawbacks, future, etc.
  • Be introduced to web application security and its importance.
  • Be aware of the vulnerabilities of web applications.
0m
0
5

Network Security Training

  • An advanced practical skill-set in assuring network security against all threats including - advanced hackers, trackers, exploit kits, Wi-Fi attacks and much more.
  • In this volume, we take a detailed look at network security.
  • Start a career in cyber security. Become a cyber security specialist.
0m
0
5

Android Application Security Training

  • Learn the fundamentals of Android Application Penetration Testing
  • Learn how to Reverse Engineer Android Apps
  • Learn how to patch Android Apps using apktool to bypass SSL Pinning
5h 12m
1
4

Secure Coding Practice Training

  • Secure programming of application code
  • Main vulnerabilities inherent in applications
  • Secure coding
0m
0
5

Swift Audit Training

  •  Restrict Internet Access & Protect Critical Systems from General IT Environment
  •  Reduce Attack Surface and Vulnerabilities
  • Physically Secure the Environment
0m
0
9

Course Access

This course is password protected. To access it please enter your password below: