Today?s threats are evolving, with many hiding inside of encrypted traffic. This course will teach you to use Palo Alto?
Wireless provides one of the biggest attack vectors for hackers. This course will teach you how to secure wireless netw
This course will teach you how to quickly spot cyber attacks and indicators of compromise in network traffic with Wiresh
Do you know the top risks to cloud computing? When you take this course, not only will you be able to easily identify th
Having a robust cloud risk and compliance culture is essential for reducing the likelihood of organizations' exposure to
This course will teach you what XML External Entity vulnerabilities are, how they are exploited, how you can identify th
Tired of dealing with slowness on networks? Grab a copy of Wireshark and follow along as you dive into packet data to in
Cybersecurity concepts are fundamental pieces of knowledge necessary to have a career in the industry. This course will
As the number of AWS IoT devices in your environment grows, it is important to properly monitor and secure them. This c
Walking into an incident response situation can be intimidating. This course will teach you how to accomplish the first
MPLS is an apex technology that combines routing, tunneling, and multi-tenancy. This course will teach you how to config
Troubleshooting IPv6 routing is a challenge. This course will give you hands-on practice troubleshooting EIGRPv6, OSPFv3
So, you want to start a career in penetration testing but don't know where to start? Maybe you've got some great hacking
In this course, you?ll learn what the malware TrickBot is and how you can analyze it to determine what it does on system
The first step on a red team exercise is the Reconnaissance phase. In this course we cover the OWASP Amass tool, which a