Network defense fundamentals Training for IT Beginners |
4H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
Learn Linux Security Through Practical Steps |
2H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
Linux Command Line for an Ethical Hacker |
4H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
AI Mastery in OT Security: Securing ICS/OT Infrastructures |
3H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
Open-source Identity and Access Management |
4H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
Practical Wireshark 3 |
2H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
Security Automation with Ansible |
4H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
Demystifying Mobile Forensics |
4H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
Offensive Perspective - OWASP Security for Developers |
5H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
Kali for Penetration Testers |
7H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
Generative AI for Cybersecurity |
4H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
Practical Cyber Threat Intelligence |
4H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
Threat Modeling Deconstructed |
4H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
Expanding MITRE ATT&CK with ATT&CK Workbench |
3H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
Black Hat Python for Pentesters |
4H |
CodeRed.EcCouncil.org |
EC-Council |
1 |
|
ISE, Access Management Training for Network Administrators - Cisco |
14H |
MaktabKhooneh.org |
MaktabKhooneh |
1, G |
|
CCNA, Cisco Network Assistant Certificate |
69H |
MaktabKhooneh.org |
MaktabKhooneh |
1, G |
|