Security
Onderstaand een overzicht van ons brede aanbod aan SECURITY IT training. Al deze trainingen maken onderdeel uit van de IT-Learning Online Academy. Wekelijks komen daar nieuwe trainingen bij. Lees MEER over de IT-Learning Online Academy of plan een online demo.
Overzicht Security IT trainingen
(ISC)2 – Certified Cloud Security Professional – Official Study Guide (CCSP) | eBook |
(ISC)2 – Certified Information Systems Security Professional – Official Study Guide (CISSP) | eBook |
(ISC)2 – Certified Secure Software Lifecycle Professional (CSSLP) – All-in-one Exam Guide | eBook |
(ISC)2 – Cloud Security Certification (CCSP) | Practice tests |
(ISC)2 – Systems Security Certified Practitioner (SSCP) | Practice tests |
(ISC)2 – Systems Security Certified Practitioner (SSCP) Official Study Guide | eBook |
(ISC)2 Certified in Cybersecurity (CC) Cert Prep | Video Course |
(ISC)2 Certified Information Systems Security Professional (CISSP) | Video Course |
(ISC)² Certified Information Systems Security Professional (CISSP) | Practice tests |
97 Things Every Information Security Professional Should Know | eBook |
Advance Your Cybersecurity Career | Video Course |
Advanced Kali Linux | Video Course |
Advanced Techniques for Ethical Hacking | Video Course |
Android App Penetration Testing | Video Course |
Antivirus Bypass Techniques- eBook | eBook |
Artificial Intelligence for Cybersecurity | Video Course |
ASP.NET Core Identity: Authentication Management | Video Course |
ASP.NET Core: Token-Based Authentication | Video Course |
ASP.NET MVC 5 Identity: Authentication and Authorization | Video Course |
ASP.NET: Security | Video Course |
Avoiding Phishing Scams | Video Course |
AWS Certified Cloud Practitioner (CLF-C01) | Practice tests |
AWS Certified Cloud Practitioner (CLF-C01) | Video Course |
AWS Certified Cloud Practitioner Study Guide | eBook |
AWS Certified Security – Specialty (SCS-C01) | Practice tests |
AWS Certified Security Specialty All-in-One Exam Guide (Exam SCS-C01) | eBook |
AWS for Developers: Identity Access Management (IAM) | Video Course |
AWS: Monitoring and Reporting | Video Course |
Azure Administration: Manage Identities | Video Course |
Azure Database Administrator Associate (DP-300) Cert Prep: 3 High Availability and Disaster Recovery in Azure Data Services | Video Course |
Azure Developer Associate (AZ-204) Cert Prep: Implement Azure Security | Video Course |
Azure Front Door | Video Course |
Azure Solutions Architect Expert (AZ-305) Cert Prep: Design Identity, Governance, and Monitoring Solutions | Video Course |
Becoming a PMP Certified Professional | eBook |
Biometric Authentication for iOS in Swift | Video Course |
Building a Cybersecurity Awareness Program | Video Course |
Building a Cybersecurity Awareness Program: Phishing Simulations | Video Course |
Building and Auditing a Cybersecurity Program | Video Course |
Building Angular and Node Apps with Authentication | Video Course |
Building the Next Generation of Cybersecurity Professionals | Video Course |
Building Vue and Node Apps with Authentication | Video Course |
Building Your Cybersecurity Talent Pipeline | Video Course |
Burp Suite Essential Training | Video Course |
Career Essentials in System Administration by Microsoft and LinkedIn | Video Course |
CASP+ (CAS-004) Cert Prep: 1 Security Architecture | Video Course |
CASP+ (CAS-004) Cert Prep: 2 Security Operations | Video Course |
CASP+ (CAS-004) Cert Prep: 3 Security Engineering and Cryptography | Video Course |
CASP+ (CAS-004) Cert Prep: 4 Governance, Risk, and Compliance | Video Course |
CCSK Cert Prep: 1 Cloud Architecture | Video Course |
CCSK Cert Prep: 3 Managing Cloud Security and Risk | Video Course |
CCSK Cert Prep: 5 Application Security and Identity Management for Cloud Computing | Video Course |
CCSK Cert Prep: 6 Cloud Security Operations | Video Course |
CCSK Cert Prep: The Basics | Video Course |
CCSP Cert Prep: 2 Cloud Data Security Audio Review | Video Course |
CCSP Cert Prep: 2 Data Security | Video Course |
CCSP Cert Prep: 3 Cloud Platform and Infrastructure Security Audio Review | Video Course |
CCSP Cert Prep: 4 Cloud Application Security | Video Course |
CCSP Cert Prep: 5 Cloud Security Operations | Video Course |
CCSP Cert Prep: 5 Cloud Security Operations Audio Review | Video Course |
CCSP Cert Prep: 6 Legal, Risk, and Compliance | Video Course |
CCSP Cert Prep: 6 Legal, Risk, and Compliance Audio Review | Video Course |
CEH v11 Certified Ethical Hacker Study Guide | eBook |
Cert Prep: Cisco CCNP Security SNCF (Exam 300-710) | Video Course |
Cert Prep: Cyber Secure Coder (CSC-110) | Video Course |
Cert Prep: Microsoft Identity and Access Administrator Associate (SC-300) | Video Course |
Cert Prep: Microsoft Security Operations Analyst Associate (SC-200) | Video Course |
Certificate of Cloud Security Knowledge (CCSK) | CSA | eBook |
Certified Ethical Hacker (CEH) 3rd Edition | Video Course |
Certified Ethical Hacker (CEH) Cert Guide | eBook |
Certified Ethical Hacker v11 – Video series with Lab Recordings | Video Course |
Certified Information Security Manager (CISM) Cert Prep (2022): 1 Information Security Governance | Video Course |
Certified Information Security Manager (CISM) Cert Prep (2022): 2 Information Security Risk Management | Video Course |
Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program | Video Course |
Certified Information Security Manager (CISM) Cert Prep (2022): 4 Incident Management | Video Course |
CISA Cert Prep: 2 Information Technology Governance and Management for IS Auditors | Video Course |
CISA Cert Prep: 4 IT Operations, Maintenance, and Service Delivery for IS Auditors | Video Course |
CISA Cert Prep: 5 Information Asset Protection for IS Auditors | Video Course |
CISA Cert Prep: The Basics | Video Course |
Cisco CCNP ENARSI (300-410) Cert Prep: 2 VPN Technologies | Video Course |
Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts | Video Course |
Cisco Certified CyberOps Associate (200-201) Cert Prep: 2 Security Monitoring | Video Course |
Cisco Certified CyberOps Associate (200-201) Cert Prep: 3 Host-Based Analysis | Video Course |
Cisco Certified CyberOps Associate (200-201) Cert Prep: 4 Network Intrusion Analysis | Video Course |
Cisco Certified CyberOps Associate (200-201) Cert Prep: 5 Security Policies and Procedures | Video Course |
Cisco DevNet Associate Cert Prep 4: Application Deployment and Security | Video Course |
Cisco Network Security: Cisco Firewall Technologies | Video Course |
Cisco Network Security: Content and Endpoint Security | Video Course |
Cisco Network Security: Core Security Concepts | Video Course |
Cisco Network Security: Intrusion Detection and Prevention | Video Course |
Cisco Network Security: Secure Routing and Switching | Video Course |
Cisco Network Security: VPN | Video Course |
CISSP Cert Prep (2021): 1 Security and Risk Management | Video Course |
CISSP Cert Prep (2021): 2 Asset Security | Video Course |
CISSP Cert Prep (2021): 3 Security Architecture and Engineering | Video Course |
CISSP Cert Prep (2021): 4 Communication and Network Security | Video Course |
CISSP Cert Prep (2021): 5 Identity and Access Management | Video Course |
CISSP Cert Prep (2021): 6 Security Assessment and Testing | Video Course |
CISSP Cert Prep (2021): 7 Security Operations | Video Course |
CISSP Cert Prep (2021): 8 Software Development Security | Video Course |
CISSP Cert Prep (2021): The Basics | Video Course |
CISSP Certification Domain 1: Security and Risk Management Video Boot Camp for 2022Â | Video Course |
Cloud Quantum Computing Essentials | Video Course |
Cloud Security Architecture for the Enterprise | Video Course |
Cloud Security Considerations for General Industry | Video Course |
Cloud Security Considerations for Government and the Military | Video Course |
Cloud Security Considerations for the Financial Services Industry | Video Course |
Cloud Security Considerations for the Healthcare Industry | Video Course |
Cloud Security Handbook | eBook |
CompTIA A+ (220-1001 & 220-1002) eBook | eBook |
CompTIA A+ (220-1001) Cert Prep 4: Storage and Peripherals | Video Course |
CompTIA A+ (220-1002) Cert Prep 8: Security and Organization | Video Course |
CompTIA A+ Core 1 (220-1101) Cert Prep: 3 Core Hardware | Video Course |
CompTIA A+ Core 2 (220-1102) Cert Prep: 4 Command-Line Interface and Scripting Languages | Video Course |
CompTIA A+ Core 2 (220-1102) Cert Prep: 8 Portable Computing Security | Video Course |
CompTIA A+ Core 2 (220-1102) Cert Prep: 9 Security and Organization | Video Course |
CompTIA Advanced Security Practitioner – CASP+ (CAS-004) | eBook |
CompTIA Advanced Security Practitioner – CASP+ (CAS-004) | Practice tests |
CompTIA Cloud Essentials+ (CLO-003) | eBook |
CompTIA Cloud+ Cert Prep (CV0-003): 3 Operations, Support, and Troubleshooting | Video Course |
CompTIA CySA+ (CS0-002) | Practice tests |
CompTIA CySA+ (CS0-002) Cert Prep: 1 Threat Management | Video Course |
CompTIA CySA+ (CS0-002) Cert Prep: 2 Vulnerability Management | Video Course |
CompTIA CySA+ (CS0-002) Cert Prep: 3 Identity and Access Management | Video Course |
CompTIA CySA+ (CS0-002) Cert Prep: 4 Software and Systems Security | Video Course |
CompTIA CySA+ (CS0-002) Cert Prep: 5 Security Operations and Monitoring | Video Course |
CompTIA CySA+ (CS0-002) Cert Prep: 6 Incident Response | Video Course |
CompTIA CySA+ (CS0-002) Cert Prep: 7 Compliance and Assessment | Video Course |
CompTIA CySA+ Study Guide (CS0-002) | eBook |
CompTIA Network+ (N10-007) Cert Prep: 5 Securing TCP/IP | Video Course |
CompTIA Network+ (N10-008) | Practice tests |
CompTIA Network+ (N10-008) Cert Prep: 2 The Physical Network | Video Course |
CompTIA Network+ (N10-008) Cert Prep: 3 The World of TCP/IP | Video Course |
CompTIA Network+ (N10-008) Cert Prep: 4 Making TCP/IP Work | Video Course |
CompTIA Network+ (N10-008) Cert Prep: 5 Securing TCP/IP | Video Course |
CompTIA Network+ (N10-008) Cert Prep: 6 Advanced IP Networking | Video Course |
CompTIA Network+ (N10-008) Cert Prep: 7 Wireless, Virtual, Cloud, and Data Center Networking | Video Course |
CompTIA Network+ (N10-008) Cert Prep: 8 Network Integration and Operation | Video Course |
CompTIA Network+ (N10-008) Cert Prep: 9 Network Security and Monitoring | Video Course |
CompTIA Pentest+ (PT0-002) | Practice tests |
CompTIA Pentest+ (PT0-002) Cert Prep: 1 Planning and Scoping | Video Course |
CompTIA Pentest+ (PT0-002) Cert Prep: 2 Information Gathering and Vulnerability Scanning | Video Course |
CompTIA Pentest+ (PT0-002) Cert Prep: 3 Attacks and Exploits | Video Course |
CompTIA PenTest+ (PT0-002) Cert Prep: 4 Reporting and Communication | Video Course |
CompTIA PenTest+ (PT0-002) Cert Prep: 5 Tools and Code Analysis | Video Course |
CompTIA Pentest+ (PT0-002) eBook | eBook |
CompTIA Project+ (PK0-004) Cert Prep: 1 Project Basics | Video Course |
CompTIA Project+ (PK0-004) Cert Prep: 2 Project Constraints | Video Course |
CompTIA Project+ (PK0-004) Cert Prep: 3 Communication and Change Management | Video Course |
CompTIA Project+ (PK0-004) Cert Prep: 4 Project Tools & Documentation | Video Course |
CompTIA Project+ (PK0-005) | eBook |
CompTIA Project+ (PK0-005) | Practice tests |
CompTIA Security+ (SY0-601) | Practice tests |
CompTIA Security+ (SY0-601) | Video Course |
CompTIA Security+ (SY0-601) Cert Prep: 1 Threats, Attacks, and Vulnerabilities | Video Course |
CompTIA Security+ (SY0-601) Cert Prep: 10 Governance, Risk, and Compliance | Video Course |
CompTIA Security+ (SY0-601) Cert Prep: 2 Secure Code Design and Implementation | Video Course |
CompTIA Security+ (SY0-601) Cert Prep: 3 Cryptography Design and Implementation | Video Course |
CompTIA Security+ (SY0-601) Cert Prep: 4 Identity and Access Management Design and Implementation | Video Course |
CompTIA Security+ (SY0-601) Cert Prep: 5 Physical Security Design and Implementation | Video Course |
CompTIA Security+ (SY0-601) Cert Prep: 6 Cloud Security Design and Implementation | Video Course |
CompTIA Security+ (SY0-601) Cert Prep: 7 Endpoint Security Design and Implementation | Video Course |
CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation | Video Course |
CompTIA Security+ (SY0-601) Cert Prep: 9 Operations and Incident Response | Video Course |
CompTIA Security+ (SY0-601) Cert Prep: Audio Review | Video Course |
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) | eBook |
Conversations on Cryptography | Video Course |
Creating a Culture of Privacy | Video Course |
CRISC Cert Prep Audio Review | Video Course |
CRISC Cert Prep: 1 Governance | Video Course |
CRISC Cert Prep: 2 IT Risk Assessment | Video Course |
CRISC Cert Prep: 3 Risk Response and Reporting | Video Course |
CRISC Cert Prep: 4 Information Technology and Security | Video Course |
CRISC Cert Prep: The Basics | Video Course |
CSSLP Cert Prep: 1 Secure Software Concepts | Video Course |
CSSLP Cert Prep: 2 Secure Software Requirements | Video Course |
CSSLP Cert Prep: 3 Secure Software Design | Video Course |
CSSLP Cert Prep: 4 Secure Software Implementation | Video Course |
CSSLP Cert Prep: 5 Secure Software Testing | Video Course |
CSSLP Cert Prep: 8 Supply Chain and Software Acquisition | Video Course |
CSSLP Cert Prep: The Basics | Video Course |
CyberSec First Responder (CFR-310) | Video Course |
Cybersecurity at Work | Video Course |
Cybersecurity Awareness: Cloud Security | Video Course |
Cybersecurity Awareness: Cybersecurity Terminology | Video Course |
Cybersecurity Awareness: Malware Explained | Video Course |
Cybersecurity Awareness: Phishing Attacks | Video Course |
Cybersecurity Awareness: Social Engineering | Video Course |
Cybersecurity Awareness: The Internet of Things (IoT) | Video Course |
Cybersecurity Awareness: Web3, Crypto, and NFTs | Video Course |
Cybersecurity Careers: Getting Started as a CISO | Video Course |
Cybersecurity for Executives | Video Course |
Cybersecurity for Small and Medium Businesses: Essential Training | Video Course |
Cybersecurity for Startups | Video Course |
Cybersecurity Foundations | Video Course |
Cybersecurity Foundations: Security Architecture | Video Course |
Cybersecurity Outsourcing: Vendor Selection and Management | Video Course |
Cybersecurity Risk Management | eBook |
Cybersecurity with Cloud Computing | Video Course |
Data-Driven Network Security Essentials | Video Course |
Defending Against and Recovering From Cybersecurity Attacks: Top Safety Practices | Video Course |
Developing Secure Software | Video Course |
DevSecOps: Automated Security Testing | Video Course |
Dynamic Application Security Testing (DAST) | Video Course |
ECIH Cert Prep: Certified Incident Handler v2 (212-89) | Video Course |
Ethical Hacking – A Hands-on Introduction to Breaking in | eBook |
Ethical Hacking with JavaScript | Video Course |
Ethical Hacking: Cloud Computing | Video Course |
Ethical Hacking: Cryptography | Video Course |
Ethical Hacking: Denial of Service | Video Course |
Ethical Hacking: Enumeration | Video Course |
Ethical Hacking: Evading IDS, Firewalls, and Honeypots | Video Course |
Ethical Hacking: Footprinting and Reconnaissance | Video Course |
Ethical Hacking: Hacking IoT Devices | Video Course |
Ethical Hacking: Hacking Web Servers and Web Applications | Video Course |
Ethical Hacking: Introduction to Ethical Hacking | Video Course |
Ethical Hacking: Mobile Devices and Platforms | Video Course |
Ethical Hacking: Scanning Networks | Video Course |
Ethical Hacking: Session Hijacking | Video Course |
Ethical Hacking: Sniffers | Video Course |
Ethical Hacking: Social Engineering | Video Course |
Ethical Hacking: SQL Injection | Video Course |
Ethical Hacking: System Hacking | Video Course |
Ethical Hacking: The Complete Malware Analysis Process | Video Course |
Ethical Hacking: Vulnerability Analysis | Video Course |
Ethical Hacking: Wireless Networks | Video Course |
Ethics in Information Security | Video Course |
Exam Prep: GIAC Security Essentials (GSEC) | Video Course |
Exam Tips: Certified Information Security Manager (CISM) (2022) | Video Course |
Exam Tips: CompTIA CySA+ (CS0-002) | Video Course |
Exam Tips: CompTIA Security+ (SY0-601) | Video Course |
Firewall Administration Essential Training | Video Course |
Five Biggest Mistakes of Cybersecurity Programs | Video Course |
Fortinet – NSE 4 FortiOS 6.2 | Practice tests |
Fortinet – NSE4 FGT 6.4 | Practice tests |
Foundational JavaScript Security | Video Course |
Foundations of Information Security | eBook |
GCIH GIAC Certified Incident Handler All-in-One Exam Guide | eBook |
GIAC – Certified Forensic Analyst (GCFA) | Practice tests |
GIAC – Certified Incident Handler (GCIH) | Practice tests |
GIAC – Certified Intrusion Analyst (GCIA) | Practice tests |
GIAC – Penetration Tester (GPEN) | Practice tests |
GIAC – Security Essentials (GSEC) | Practice tests |
GIAC – Security Leadership (GSLC) | Practice tests |
Graphite and Grafana: Visualizing Application Performance | Video Course |
How to Hack Like a Ghost | eBook |
Implementing a Privacy, Risk, and Assurance Program | Video Course |
Implementing a Vulnerability Management Lifecycle | Video Course |
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines | eBook |
Implementing an Information Security Program | Video Course |
Implementing Service Level Objectives | eBook |
Implementing the NIST Privacy Framework | Video Course |
Implementing the NIST Risk Management Framework | Video Course |
Incident Response Planning | Video Course |
Incident Response with PagerDuty | Video Course |
Incident Response: Evidence Collection in Windows | Video Course |
Information Security Risk Management for ISO 27001/ISO 27002, third edition | eBook |
Inside the Breach | Video Course |
Insights from a Cybersecurity Professional | Video Course |
Introduction to Amazon Braket: Quantum Computing on AWS | Video Course |
Introduction to AWS for Non-Engineers: 2 Security | Video Course |
Introduction to AWS Penetration Testing | Video Course |
Introduction to Identity and Access Management | Video Course |
Introduction to NFTs: Non-fungible Tokens | Video Course |
Introduction to Quantum Computing | Video Course |
Introduction to Quantum Cryptography | Video Course |
ISACA – Certified in Governance of Enterprise IT (CGEIT) | Practice tests |
ISACA – Certified in Risk & Information Systems Control (CRISC) | Practice tests |
ISACA – Certified in Risk and Information Systems Control (CRISC) All-in-One Exam Guide 2nd Edition | eBook |
ISACA – Certified Information Security Manager (CISM) | eBook |
ISACA – Certified Information Security Manager (CISM) | Practice tests |
ISACA – Certified Information Systems Auditor (CISA) | Practice tests |
ISACA – CISA (Certified Information Systems Auditor) | Video Course |
ISACA – Control Objectives for Information Technologies (COBIT 5) | Practice tests |
ISO 27001 controls A guide to implementing and auditing | eBook |
ISO 27001 ISMS Foundation Training Course | Video Course |
ISO 27001:2013-Compliant Cybersecurity: Annex A Controls | Video Course |
ISO 27001:2013-Compliant Cybersecurity: Getting Started | Video Course |
IT and Cybersecurity Risk Management Essential Training | Video Course |
IT Security Careers and Certifications: First Steps | Video Course |
IT Security Foundations: Core Concepts | Video Course |
IT Security Foundations: Network Security | Video Course |
IT Security Foundations: Operating System Security | Video Course |
IT Security: Key Policies and Resources | Video Course |
JavaScript: Security Essentials | Video Course |
Learning Amazon Cognito | Video Course |
Learning Autopsy for Digital Forensics | Video Course |
Learning Cloud Computing: Cloud Governance | Video Course |
Learning Cloud Computing: Cloud Security | Video Course |
Learning Computer Forensics | Video Course |
Learning Computer Security and Internet Safety | Video Course |
Learning Cryptography and Network Security | Video Course |
Learning Cyber Incident Response and Digital Forensics | Video Course |
Learning Google Cloud Security | Video Course |
Learning Kali Linux | Video Course |
Learning Kali Linux on Windows | Video Course |
Learning Penetration Testing | Video Course |
Learning Security Frameworks | Video Course |
Learning Security Metrics | Video Course |
Learning SSL/TLS | Video Course |
Learning the OWASP Top 10 | Video Course |
Learning the OWASP Top 10 (2018) | Video Course |
Learning Threat Modeling for Security Professionals | Video Course |
Learning Tor and the Dark Web | Video Course |
Learning VPN | Video Course |
Learning Vulnerability Management | Video Course |
Learning WireGuard | Video Course |
Linux Security and Hardening Essential Training | Video Course |
Linux System Engineer: Authentication with LDAP and Kerberos | Video Course |
Linux: User and Group Management | Video Course |
LPIC-2 Linux Engineer (202-450): 6 System Security | Video Course |
Machine Learning and AI Foundations: Classification Modeling | Video Course |
Machine Learning Foundations: Linear Algebra | Video Course |
Metasploit Essential Training | Video Course |
Metaverse and NFTs for Marketing | Video Course |
Microservices: Security | Video Course |
Microsoft 365 Enterprise Administrator Expert (MS-101) Cert Prep: 1 Plan and Implement Device Services | Video Course |
Microsoft 365 Enterprise Administrator Expert (MS-101) Cert Prep: 2 Manage Security and Threats by using Microsoft 365 Defender | Video Course |
Microsoft 365 Security Administrator Associate (MS-500) Cert Prep: 2 Implement and Manage Threat Protection | Video Course |
Microsoft 365 Security Administrator Associate (MS-500) Cert Prep: 3 Implement and Manage Information Protection | Video Course |
Microsoft 365 Security Administrator Associate (MS-500) Cert Prep: 4 Manage Governance and Compliance Features in Microsoft 365 | Video Course |
Microsoft 98-365 – Windows Server Administration Fundamentals | Practice tests |
Microsoft 98-367 – Security Fundamentals | Practice tests |
Microsoft AZ-500 | Practice tests |
Microsoft AZ-500 – Microsoft Azure Security Technologies | eBook |
Microsoft AZ-500 Azure Security Technologies | Video Course |
Microsoft AZ-500 Azure Security Technologies eBook | eBook |
Microsoft Azure Fundamentals (AZ-900) Cert Prep: 2 Azure Architecture and Security | Video Course |
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 1 Manage Identity and Access | Video Course |
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 3 Manage Security Operations | Video Course |
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 4 Secure Data and Applications | Video Course |
Microsoft Azure: Backup and Disaster Recovery | Video Course |
Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep: 1 Design a Zero Trust Strategy and Architecture | Video Course |
Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep: 2 Evaluate Governance Risk Compliance (GRC) and Security Operations Strategies | Video Course |
Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep: 4 Design Strategy for Data and Applications | Video Course |
Microsoft Exam AZ-500 – Azure Security Technologies | Video Course |
Microsoft MS-101 – Microsoft 365 Mobility and Security | eBook |
Microsoft MS-101 – Microsoft 365 Mobility and Security | Video Course |
Microsoft MS-101 Microsoft 365 Mobility and Security | Practice tests |
Microsoft MS-101 Microsoft 365 Mobility and Security eBook | eBook |
Microsoft MS-500 – Microsoft 365 Security Administration | eBook |
Microsoft MS-500 Microsoft 365 Security Administration | Practice tests |
Microsoft SC-100 – Microsoft Cybersecurity Architect | eBook |
Microsoft SC-200 – Microsoft Security Operations Analyst | eBook |
Microsoft SC-300 – Microsoft Identity and Access Administrator | eBook |
Microsoft SC-300 – Microsoft Identity and Access Administrator | Video Course |
Microsoft SC-400 – Microsoft Information Protection Administrator | eBook |
Microsoft SC-900 – Microsoft Security, Compliance, and Identity Fundamentals | eBook |
Microsoft SC-900 – Microsoft Security, Compliance, and Identity Fundamentals | eBook |
Microsoft SC-900 – Security, Compliance, and Identity Fundamentals | Video Course |
Microsoft SC-900 Microsoft Security, Compliance, and Identity Fundamentals | Practice tests |
Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Cert Prep: 1 Core Concepts | Video Course |
Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Cert Prep: 3 Understanding Microsoft Security Solutions | Video Course |
Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Cert Prep: 4 Understanding Microsoft Security and Compliance Capabilities | Video Course |
Network Forensics | Video Course |
Node: Authentication | Video Course |
Operating System Forensics | Video Course |
OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures | Video Course |
OWASP Top 10: #1 Injection and #2 Broken Authentication | Video Course |
OWASP Top 10: #3 Injection and #4 Insecure Design | Video Course |
OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE) (2019) | Video Course |
OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration (2019) | Video Course |
OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components | Video Course |
OWASP Top 10: #7 XSS and #8 Insecure Deserialization | Video Course |
OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring | Video Course |
Palo Alto Networks Cybersecurity Fundamentals: 1 Cybersecurity Contexts | Video Course |
Palo Alto Networks Cybersecurity Fundamentals: 2 Systems and Networking | Video Course |
Palo Alto Networks Cybersecurity Fundamentals: 3 Security Solutions | Video Course |
Penetration Testing Active Directory | Video Course |
Penetration Testing Essential Training | Video Course |
Penetration Testing with Metasploit | Video Course |
Penetration Testing: Advanced Web Testing | Video Course |
Performing a Technical Security Audit and Assessment | Video Course |
PHP: User Authentication | Video Course |
PowerShell: Securing Windows Environments | Video Course |
Practical Cloud Security | eBook |
Practical Cybersecurity for IT Professionals | Video Course |
Practical Doomsday | eBook |
Practical Fraud Prevention | eBook |
Programming Foundations: Discrete Mathematics | Video Course |
Programming Foundations: Secure Coding | Video Course |
Programming Foundations: Web Security | Video Course |
Project Management Foundations: Risk | Video Course |
Protecting Your Network with Open Source Software | Video Course |
Python for Security | Video Course |
Ransomware Protection Playbook | eBook |
React: Securing Applications | Video Course |
Secure Coding in C | Video Course |
Secure Coding in Go | Video Course |
Secure Coding in Java | Video Course |
Secure Coding in Python | Video Course |
Securing the IoT: Privacy | Video Course |
Securing the Metaverse | Video Course |
Securing Windows Server 2016: Implementing Threat Detection Solutions | Video Course |
Securing Windows Server 2016: Managing Privileged Identities | Video Course |
Securing Windows Server 2019 | Video Course |
Securing Your Home Office | Video Course |
Security for the SMB: Implementing the NIST Cybersecurity Framework | Video Course |
Security in Fintech Essential Training | Video Course |
Security Matters (To Everyone) | Video Course |
Security Risks in AI and Machine Learning: Categorizing Attacks and Failure Modes | Video Course |
Security Testing Essential Training | Video Course |
Security Testing: Nmap Security Scanning | Video Course |
Security Testing: Vulnerability Management with Nessus | Video Course |
Security Tips | Video Course |
Security Tips: Browsing the Web | Video Course |
Security Tips: Protecting Sensitive Information | Video Course |
SOC 2 Compliance Essential Training | Video Course |
Soft Skills for Information Security Professionals | Video Course |
SSCP Cert Prep: 1 Security Operations and Administration | Video Course |
SSCP Cert Prep: 2 Access Controls | Video Course |
SSCP Cert Prep: 3 Risk Identification, Monitoring, and Analysis | Video Course |
SSCP Cert Prep: 4 Incident Response and Recovery | Video Course |
SSCP Cert Prep: 5 Cryptography | Video Course |
SSCP Cert Prep: 6 Network and Communications Security | Video Course |
SSCP Cert Prep: 7 Systems and Application Security | Video Course |
SSCP Cert Prep: The Basics | Video Course |
SSL Certificates for Web Developers | Video Course |
Static Application Security Testing (SAST) | Video Course |
Supply Chain Fundamentals: Risk and Resilience | Video Course |
Symmetric Cryptography Essential Training | Video Course |
Ten Security Tips for Developers | Video Course |
The Beginners 2022 Cyber Security Awareness Training Course | Video Course |
The CISO Evolution | eBook |
The Cybersecurity Threat Landscape | Video Course |
The Data Science of Healthcare, Medicine, and Public Health | Video Course |
The New Age of Risk Management Strategy for Business | Video Course |
The Security Culture Playbook | eBook |
Threat Hunting Essential Training | Video Course |
Threat Modeling: Denial of Service and Elevation of Privilege | Video Course |
Threat Modeling: Information Disclosure in Depth | Video Course |
Threat Modeling: Repudiation in Depth | Video Course |
Threat Modeling: Spoofing In Depth | Video Course |
Threat Modeling: Tampering in Depth | Video Course |
Top Privacy Concerns for Small Businesses | Video Course |
Understanding Zero Trust | Video Course |
Using SABSA to Architect Cloud Security | Video Course |
VMware NSX-T 3.0 Essential Training: 06 Security | Video Course |
Vulnerability Management: Assessing the Risks with CVSS v3.1 | Video Course |
Web Application Security | eBook |
Web Security for Developers | eBook |
Web Security: OAuth and OpenID Connect | Video Course |
Web Security: Same-Origin Policies | Video Course |
Web Security: User Authentication and Access Control | Video Course |
Windows 11: Security | Video Course |
Windows Server 2022: Implementing Group Policy | Video Course |
Windows Server Hybrid Administrator Associate (AZ-801) Cert Prep: 3 Implement Disaster Recovery | Video Course |
Wireshark Essential Training | Video Course |
Wireshark: Advanced Tools and Techniques | Video Course |
Wireshark: Functionality | Video Course |
Wireshark: Malware and Forensics | Video Course |
Wireshark: Network Troubleshooting | Video Course |