Cybersecurity
Showing 565–576 of 1211 results
Information Systems Auditing: The Big Picture
This course will provide you with an excellent overview of the process and benefits of Information Systems Auditing.
Information Systems Operations: Monitoring
This course describes the knowledge that is essential for you as an information systems auditor. You will learn the components of information systems and the processes that support them, enabling you to provide meaningful evaluations of systems.
Information Systems Operations: Resilience
Auditors must understand the processes and methodologies of business resilience, and be able to assess the ability of the organization to manage incidents and recover from crisis. In this course, you will learn the ways to perform these audits.
Information Systems Risk Manager
This Free Online Course Includes: 3-4 Hours of Learning CPD Accreditation Final Assessment
Information Technology and Security ISACA® CRISC™
This course will teach you the principles of risk management in regard to information technology and security needed for the CRISC™ examination.
Infrastructure and Network Security Architecture Planning and Design
Understand the principles of designing secure infrastructures and networks to protect against threats.
Infrastructure Security
Learn strategies for securing IT infrastructure, including networks, servers, and applications.
Infrastructure-as-Code Security: Why, What, and How
In this talk, you'll learn about common IaC risks and best practices for securing infrastructure at scale using policy-as-code in both in build-time and run-time.
Initial Access with Gophish
Gophish is an open source phishing tool written in the Go programming language for use by businesses and penetration testers to test for phishing awareness in their organization. In this course, you will learn Initial Access using Gophish.
Initial Access with King Phisher
King Phisher is a feature-rich tool for coordinating and monitoring successful phishing campaigns to further red teaming objectives towards initial access. In this course, you will learn initial access using King Phisher.
Initial Access with Luckystrike
Malicious office documents are an effective way to gain an initial foothold into a network. In this course, you will learn how to use Luckystrike to create custom malicious office documents, manage multiple payloads, and utilize custom templates.
Initial Access with sqlmap
sqlmap is a powerful automation tool for identifying and exploiting SQL injection flaws. Add another tool to your toolbox by using sqlmap to exfiltrate data and gain initial access.