Networking
-
Cisco Certified Network Associate (CCNA) Certification
-
Cyber Network Security
-
Secure Network Access
-
Closing Ports and Unnecessary Services
-
Network Management
-
Network Security - Firewalls
-
Network Troubleshooting
-
TCP/IP Protocols - The Core Protocols
-
Closing Security Holes
-
Domain Security
-
Intrusion Detection using Snort
-
Using Snort and Wireshark to Analyze Traffic Applying Filters to TCPDump and Wireshark
-
Parse Files Out of Network Traffic
-
Configure a Virtual Network Service Endpoint
-
Configure Linux Firewall ACL Rules
-
Configure IP Routing with Linux on Azure
-
Configure Network Connectivity for Linux on Azure
-
Deploy Ubuntu Linux Virtual Machines in the Microsoft Azure
-
CompTIA Linux+ - XK0-004
-
Use RBAC and Design a Custom Role
-
Manage a Serverless Compute Environment
-
Manage a Web App
-
Use PKI to Secure a Network Environment
-
Configure a Network Security Group in a Virtual Network
-
Identify Non-Secure Network Traffic
-
The OSI Model
Penetration Testing
-
Open Source Intelligence (OSINT) Fundamentals
-
NMAP
-
Vulnerability Scanner Set-up and Configuration
-
Vulnerability Scanner Set-up and Configuration, Pt. 2
-
Identifying System Vulnerabilities with OpenVAS
-
Automated Vulnerability Assessments
-
Core Impact Vulnerability Scan
-
Vulnerability Scan Analysis
-
Vulnerability Analysis/Protection
-
Creating Recommendations Based on Vulnerability
-
Assessments
-
Social Engineering
-
Kali Linux Fundamentals
-
Phishing
-
USB Drop Attack
-
Penetration Testing and Ethical Hacking
-
Network Discovery
-
Preliminary Scanning
-
Additional Scanning Options
-
Scanning and Mapping Networks
-
Scanning the Network on the LAN
-
Password Cracking Tool Fundamentals
-
Password Cracking 101
-
Use a Password Cracking Utility in Linux
-
Sniffing
-
Capturing and Analyzing Network Traffic Using a Sniffer
-
Wireshark
-
Enumerating Hosts using Wireshark, Windows, and Linux Commands
-
Web Application Penetration Testing
-
Exploiting a Vulnerable Web Application
-
Intro to Burp Suite Pro
-
Advanced Penetration Testing
-
Attacking the Firewall and Stealing Data over an Encrypted
-
Channel
-
How to Use hping3 (BSWJ)
-
How to Use Unicornscan (BSWR)
-
How to Use THC-Hydra (BSWR)
-
How to Use ExploitDB (BSWJ)
-
Post Exploitation Hacking
-
Offensive Penetration Testing
-
Penetration Testing Execution Standard (PTES)
-
Red Team and Blue Team Fundamentals
Cybersecurity
- Fundamentals of Cybersecurity Architecture
- Centralized Monitoring
- Preliminary Scanning
- Data Backup and Recovery
- Vulnerability Scan Analysis
- Certified Information Systems Security Professional (CISSP)
- Certified Information Systems Security Professional (CISSP)
- Certified Cloud Security Professional (CCSP)
- Using PowerShell to Analyze a System
- Advanced Techniques for Malware Recovery
- Applying Filters to TCPDump and Wireshark
- Create Custom Snort Rules
- Dynamic Malware Analysis Capstone
- Parse Files Out of Network Traffic
- IDS Setup
- Comprehensive Threat Response
- Denial of Service PCAP Analysis
- Recover from SQL Injection Attack
- Recover from Web-Based Flashpack Incident
- Post Incident Service Restoration
- Risk Management Framework
- Identify Whether High-Risk Systems Were Affected
- Corporate Cybersecurity Management