[Cybrary] Become a Penetration Tester

Cybrary – Become a Penetration Tester [FCO] About Last year, penetration testers ranked as one of the three most in-demand jobs in the growing cybersecurity job market. To become a penetration tester, a college degree is not necessary since it’s a skills-based profession. Employers want professionals who can demonstrate the required skills, regardless of education. […]

[Coursera] Cybersecurity Attack And Defense Fundamentals Specialization

Coursera – Cybersecurity Attack and Defense Fundamentals Specialization [FCO] About Learn Ethical Hacking, Network Defense & Forensics. Master foundational skills to pursue a cybersecurity career and help build and maintain a secure infrastructure. What you’ll learn Information security threats, vulnerabilities, and attacks. Network security assessment techniques and tools. Computer forensics fundaments, digital evidence, and forensic […]

[O’REILLY] Building A Career In Cybersecurity

O’REILLY – Building a Career in Cybersecurity [FCO] About 3 Hours of Video Instruction Learn the strategy and skills you need to succeed in the cybersecurity field Overview Cybersecurity is an exciting, fast-growing industry. But how do you get started in the field and stand out from the competition? What do you need to fast […]

[Pluralsight] Kali Linux Concepts And Basic Functionality

Pluralsight – Kali Linux Concepts and Basic Functionality [FCO] About This course will teach you about Kali Linux, a popular tool used to discover threats and vulnerabilities in computer systems and networks. What you’ll learn Kali Linux is a very popular operating system and tool platform used by cybersecurity professionals for discovering threats and weaknesses […]

[Coursera] Python For Cybersecurity Specialization (Infosec)

Coursera – Python for Cybersecurity Specialization [FCO] About Specialization – 5 course series Master Python for a variety of cybersecurity tasks. This Specialization provides an application-driven introduction to using Python for cybersecurity. What you’ll learn – Develop custom Python scripts to automate cybersecurity tasks. – Apply Python to meet objectives through the cybersecurity attack lifecycle. […]

[Pluralsight] System And File Analysis With Bash

Pluralsight – System and File Analysis with Bash [FCO] About Welcome to System and File Analysis with Bash. This course will teach you how to use Bash scripts to collect system information, such as log files, registry keys, and how to perform file and data analysis during a cybersecurity incident response. What you’ll learn Responding […]

Mastering Cyber Intelligence [eBook]

Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense [eBook] [FCO] About Develop the analytical skills to safeguard your organization by enhancing defense mechanisms, and become a proficient threat intelligence analyst to help strategic teams make informed decisions Is this book for you? – Are you a security […]

Philosophy Of Cybersecurity [eBook]

Philosophy Of Cybersecurity [eBook] [FCO] About Technology and digitization are a great social good. But they also involve risks and threats. Cybersecurity is not just a matter of data or computer security; cybersecurity is about the security of society. Why “Philosophy”? To understand how to reason and think about threats and cybersecurity in today’s and […]

[Coursera] Computer Security And Systems Management Specialization

Coursera – Computer Security And Systems Management Specialization [FCO] About Practical Application to System Management. Learn how to securely design and manage enterprise systems utilizing mainstream operating systems Advance your subject-matter expertise – Learn in-demand skills from university and industry experts – Master a subject or tool with hands-on projects – Develop a deep understanding […]

[O’REILLY] The Complete Cybersecurity Bootcamp, 2nd Edition

O’REILLY – The Complete Cybersecurity Bootcamp, 2nd Edition [FCO] About Get Cybersecurity intensive training with Omar Santos’ live training courses 26 Hours of Detailed, Curated Video Training to Take You from Basic to Guru in Cybersecurity In-Detail The Complete Cybersecurity Bootcamp, 2nd Edition is your comprehensive guide to becoming a cybersecurity professional. The extensive course […]

[INE] Security Engineering And System Hardening Bootcamp

INE – Security Engineering And System Hardening Bootcamp [FCO] About As the world becomes more and more connected and technology becomes even more ingrained into business and home life, properly protecting that infrastructure has become more important than ever before. From Windows servers to workstations, Linux to Mac, and IoT to ICS, it’s critically important […]

[ITProTV] NIST Cybersecurity And Risk Management Frameworks

ITProTV – NIST Cybersecurity And Risk Management Frameworks [FCO] About Apply, adapt, respond, and recover using the NIST framework In-Detail NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data. In this course, you will apply the NIST Cybersecurity and Risk Management Frameworks to […]

[PacktPub] Pentesting Fundamentals For Beginners [Video]

PacktPub – Pentesting Fundamentals for Beginners [Video] [FCO] About Ethical hacking fundamentals do not change from one exam to the next. One can expect to see questions about Nmap, what commands were used to generate a specific output, and which tool would you use, regardless of the exam vendor. An individual is expected to know […]

[CBT Nuggets] Fundamental Cryptography Explained

CBT Nuggets – Fundamental Cryptography Explained [FCO] About This intermediate Fundamental Cryptography Explained training prepares learners to think about keeping information secure as it tries to get from one end of the internet to the other, using the science of cryptography. Throughout human history, keeping secret information secret has been at the heart of the […]

[CBT Nuggets] Cloud Security Training For Software Developers

CBT Nuggets – Cloud Security Training For Software Developers [FCO] About This intermediate Cloud Security Training for Software Developers training prepares learners to code and develop inside the cloud safely with a fundamental understanding of cloud security fundamentals. The cloud was supposed to be the answer to everyone’s problems and usher in a golden age. […]

[CBT Nuggets] Fundamental Data Security In The Cloud

CBT Nuggets – Fundamental Data Security In The Cloud [FCO]   Fundamental Data Security in the Cloud Online Training This intermediate Fundamental Data Security in the Cloud training prepares security professionals to provide a basic level of security to cloud data networks, whether hybrid or completely in the cloud. There are very few companies who […]

[O’REILLY] Fundamentals Of Secure Software

O’REILLY – Fundamentals Of Secure Software [FCO] In-Detail Application security describes security measures at the application level that aim to prevent data or code within the app from being stolen or hijacked. It may include hardware, software, and procedures that identify or minimize security vulnerabilities. Web application security is the process of securing websites, web […]

[PentesterAcademy] Attacking and Defending Active Directory: Beginner’s Edition

PentesterAcademy – Attacking and Defending Active Directory: Beginner’s Edition [FCO] About Build expertise in attacking and defending real-world enterprise Active Directory environments. What You’ll Learn This is a 4-week beginner-friendly bootcamp, designed to teach security professionals how to identify and analyze threats in a modern Active Directory environment. The bootcamp will cover topics like Active […]

[ZeroToMastery] Complete Cybersecurity Bootcamp

ZeroToMastery – Complete Cybersecurity Bootcamp [FCO] About The Cybersecurity Bootcamp that will take you from ZERO to HIRED as a Cyber Security Engineer. You’ll learn the latest best practices, techniques, and tools used for network security so that you can build a fortress for digital assets and prevent black hat hackers from penetrating your systems. […]

[CBT Nuggets] Fortinet NSE 5 – FortiManager 7.x

  Description In this 74-video of 8 hours, intermediate-level training, CBT Nuggets trainer Keith Barker covers the knowledge security professionals need to maintain control of an entire network of Fortinet security devices with FortiManager – administering devices, rolling out configuration updates and installing configuration updates. Fortinet does more than manufacture security devices, they also provide […]

[O’REILLY] Threat Intelligence and Threat Hunting

  Video Description: 7+ hours of video training exploring key threat intelligence and threat hunting concepts   Overview: A cybersecurity professional needs to understand threats, threat actors, and have a clear understanding of where attackers are trying to take advantage of vulnerabilities. With more than 7 hours of video training, Threat Intelligence and Threat Hunting […]

[Cybrary] Advanced Penetration Testing

  About The Advanced Penetration Testing course teaches the cyber attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection.   Course Description “Those who continuously acquire new and better forms of […]

[CBT Nuggets] Fortinet NSE 4 Certification Training – FortiOS 7.x

  Description: In this 203-video, entry-level training, CBT Nuggets trainer Keith Barker covers the knowledge security technicians need to take responsibility for the configuration, monitoring and operation of FortiGate devices in day-to-day network security operations. This intermediate NSE 4 training prepares learners to take the Fortinet NSE 4 – FortiOS exam, which is the one […]

[Pluralsight] Incident Response: Detection and Analysis

  About Walking into an incident response situation can be intimidating. This course will teach you how to accomplish the first phase of incident response, the initial detection and analysis.   Description In an incident response scenario, it’s hard to know where to start. In this course, Incident Response: Detection and Analysis, you’ll learn to […]

[Pluralsight] Ethical Hacking: Enumeration

  About The third phase attackers perform on a target is enumerating accounts and services. This course will teach you skills attackers use for enumeration that needed for the Certified Ethical Hacking exam.   Description To truly compromise a system, making sure you know what OS, accounts, and services that are running is key. In […]

[O’REILLY] Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition

  Video Description Designed to help you pass the EC-Council Certified Ethical Hacker (CEH) certification exam.   Overview The Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition gives you a complete overview of the topics in the EC-Council’s updated Certified Ethical Hacker (CEH), V11 exam. This video course has six modules that dive into […]

[InfoSec] CISSP Certification Boot Camp

  Take your career to the next level by earning one of the most in-demand cybersecurity certifications. Infosec’s CISSP training provides a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional.   Overview: Earning your CISSP requires a broad range of cybersecurity skills, from developing security […]

[PentesterAcademy] Cloud Security: AWS Bootcamp [2021]

  Description Most AWS deployments are breached by a common set of vulnerabilities which attackers repeatedly use. In 5 weeks, this bootcamp teaches you to identify, exploit and secure vulnerabilities in the 5 most commonly used AWS components, so you can be a job-ready Cloud Security practitioner.   What You’ll Learn The syllabus of this […]

[Lynda] Risk Management for IT and Cybersecurity Managers

  Author: Jason Dion Released: 4/24/2020 Duration: 1h 22m Skill Level: Beginner   About Curious about why leaders at your organization decided not to fund your project? In this course, get an inside look at how cybersecurity and information technology (IT) managers use a preliminary risk analysis to determine which projects to pass on and […]

[Linkedin] Rapid Application Development with Python

Course details Developing graphical user interfaces (GUIs) in Python traditionally involves a lot of manual coding. wxGlade, a GUI designer written in Python for the wxPython GUI toolkit, was designed to help simplify this process. In this course, learn how to quickly develop Python GUI apps using the wxPython library—which brings the wxWidgets capability to […]