Tag: Cybersecurity

Other IT & Software Courses
bg
Deep and Dark Web Monitoring (OSINT)

Deep and Dark Web Monitoring (OSINT)

Mastering the Art of OSINT for Deep and Dark Web Monitoring

Network & Security Courses
bg
Mastering the Security Code Review

Mastering the Security Code Review

Secure, Clean, Scalable, and Effective Code Reviews for Teams

IT & Software Courses
bg
AI & Cybersecurity: Threats, Global Actors, and Trends-2025

AI & Cybersecurity: Threats, Global Actors, and Trends-...

How AI is Changing Cybersecurity, Global Threats, and Defense

Network & Security Courses
bg
Cyber Security: Phishing

Cyber Security: Phishing

Defend against Phishing Attacks

Network & Security Courses
bg
AI for CyberSecurity with ChatGPT: Automate Security Defense

AI for CyberSecurity with ChatGPT: Automate Security De...

Master Cyber Security with AI and ChatGPT - Learn to Boost Threat Detection & In...

Network & Security Courses
bg
An ninh mạng cho người mới bắt đầu

An ninh mạng cho người mới bắt đầu

Introduction to cybersecurity, hướng dẫn các bạn mới bắt đầu tìm hiểu về lĩnh vự...

Network & Security Courses
bg
Full Cyber Security Course From 0: Ethical Hacking & Defense

Full Cyber Security Course From 0: Ethical Hacking & De...

Your Hands-On Cyber Security Journey Starts Here: Go from beginners to Intermedi...

Network & Security Courses
bg
Cybersecurity and Ethical Hacking in Hindi (हिन्दी)

Cybersecurity and Ethical Hacking in Hindi (हिन्दी)

Cybersecurity और Ethical Hacking स्किल्स में महारत हासिल करें: थ्रेट्स को डिटेक्...

Network & Security Courses
bg
Python Cybersecurity Mastery: Encryption & Threat Detection

Python Cybersecurity Mastery: Encryption & Threat Detec...

Learn Python for advanced cybersecurity techniques: networking, encryption, and ...

Network & Security Courses
bg
ICS/SCADA/OT Protocol Traffic Analysis: IEC 60870-5-104

ICS/SCADA/OT Protocol Traffic Analysis: IEC 60870-5-104

ICS/SCADA/OT Protocol Network Traffic Analysis Series: IEC 60870-5-104

Network & Security Courses
bg
Vulnerability Scanning with Nessus for Penetration Testing

Vulnerability Scanning with Nessus for Penetration Testing

Learn to hack computers and networks with Tenable Nessus and secure them like se...

Network & Security Courses
bg
Zero to Hero in Cybersecurity and Ethical Hacking

Zero to Hero in Cybersecurity and Ethical Hacking

Master Cybersecurity and Ethical Hacking: From Vulnerability Assessment to AI-Dr...

Network & Security Courses
bg
Phishing 101

Phishing 101

Réaliser des campagnes de phishing efficientes : Lancez votre canne et laissez l...

Network & Security Courses
bg
"Best Practices" for Cybersecurity & GRC Professionals

"Best Practices" for Cybersecurity & GRC Professionals

"Best Practices" for Cybersecurity & GRC Professionals

Network & Security Courses
bg
Anti-Hacker Security | Step By Step Guide

Anti-Hacker Security | Step By Step Guide

Secure your confidential Data, Website, Social Media, Email, Computer and Mobile...

We use cookies to improve your experience on our site. By continuing to browse the site you are agreeing to our use of cookies Find out more here