Popular Network & Security Courses

bg
Ultimate Flipper Zero Course (EN)

Ultimate Flipper Zero Course (EN)

Unlock the full potential of your Flipper Zero with my hands-on course and learn...

bg
Mastering Ethical Hacking Challenges: Capture the Flag V1

Mastering Ethical Hacking Challenges: Capture the Flag V1

Hands-On Training with Real-World CTF Scenarios to Elevate Your Ethical Hacking ...

bg
Netcat for Ethical Hackers & Network Ninjas

Netcat for Ethical Hackers & Network Ninjas

A Hands-On Guide to Using Netcat for Security Testing, File Transfers, and Remot...

bg
Ethical Hacking: Password Cracking

Ethical Hacking: Password Cracking

Crack Passwords of Windows, Linux and Servers

bg
5G技术及行业创新应用

5G技术及行业创新应用

5G技术深度认知

bg
Practical Industrial Control System Penetration Testing

Practical Industrial Control System Penetration Testing

Empowering You with Offensive ICS/OT Cyber Security Knowledge

bg
OAuth 2.0 Simplified Secure API Access for Beginners

OAuth 2.0 Simplified Secure API Access for Beginners

A complete guide to understanding and implementing OAuth 2.0 for secure API access

bg
Masterclass -  CISA Exam (Updated 2025)

Masterclass - CISA Exam (Updated 2025)

Hemang Doshi's course for ISACA's Certified Information System Auditor (CISA) Ex...

bg
Cyber Security: Common Attacks

Cyber Security: Common Attacks

Protect yourself against hackers

bg
Execute the NIST Risk Management Framework (RMF) Essentials

Execute the NIST Risk Management Framework (RMF) Essent...

Implement NIST RMF: Security, Compliance, Risk Management, Agile, Cloud, DevSecO...

bg
Cisco ASA Firewall Fundamentals: Basics of Network Security™

Cisco ASA Firewall Fundamentals: Basics of Network Secu...

A Complete Beginner Guide to Cisco ASA Firewall | Learn How to Install and Confi...

bg
Reverse Engineering Ransomware

Reverse Engineering Ransomware

Static and dynamic analysis. Reverse engineering. Writing Decryptors

bg
Full Ethical Hacking & Penetration Testing Course | Ethical

Full Ethical Hacking & Penetration Testing Course | Eth...

Ethical Hacking, Penetration testing, Web hacking, Bug bounty, Metasploit, Secur...

bg
Ethical Hacking & Penetration Testing with Metasploit

Ethical Hacking & Penetration Testing with Metasploit

Ethical Hacking course and Penetration Testing incl. Metasploit, Password Cracki...

bg
Construye tu Propio Call Center con Vicidial (ACTUALIZADO)

Construye tu Propio Call Center con Vicidial (ACTUALIZADO)

Como poner en producción un Vicidial

bg
PCI DSS Bootcamp: The A-Z™ Information Security Course

PCI DSS Bootcamp: The A-Z™ Information Security Course

Master the 12 Requirements of PCI DSS v4.0 Compliance, Cyber Security and Identi...

We use cookies to improve your experience on our site. By continuing to browse the site you are agreeing to our use of cookies Find out more here