Network Security
Showing 169–180 of 192 results

Social Engineering and Defenses
What is social engineering?, How and why social engineering works, Types of social engineering attacks, Baiting, Tailgating, Pretexting, Quid pro quo, Scareware, and More

Software-Defined Perimeter (SDP): Leveraging Zero Trust to Create a New Network and Security Architecture
In this course, you will gain the knowledge to implement the new approach to securing your network infrastructure and applications using the software-defined perimeter approach to zero trust (SDP). SDP makes protected assets invisible.

Start Hacking and Making Money Today at HackerOne
Hack Legally and Get Paid For Your Findings

The Best Phishing Awareness Training Video For Employees
Making the world phishing alert ready

The Complete Guide to Bug Bounty Hunting
Learn the essentials to become an ethical hacker, and conduct fruitful penetration tests for bug bounties!

The Complete Practical Ethical Hacking Expert 199courses
Beginner to Advance Ethical hacking Course which will turn anyone into a professional hacker - A FCKSchool Product

The Complete VMware vSphere 6.5: Beginner to Advanced-pt 1/2
Start from absolute zero, and learn to use Vmware vSphere 6.5 as it was meant to be used, Full Practical Training Course.

The IT Ops Sessions: Enhancing SASE with SD-WAN Security
In this IT Ops Session, you’ll learn why, how, and when to combine SD- WAN with SASE.

The IT Ops Sessions: Secure Access Service Edge (SASE): Evolving Networking and Security
In this IT Ops session, you’ll learn how SASE has evolved networking and security to meet todays demands.

Two Factor Authentication (2FA)
What is two factor authentication 2FA?, Types of authentication factors used in 2FA, Knowledge factors: Something the user knows, Possession factors: Something the user has, Passwordless 2FA and More

Uncle Rats XXE Handbook
XXE Made Simple!

Using Intermediate Wireshark 3 Features
Wireshark is the most widely used packet analyzer in the world, and the go-to tool for breaking down network traffic. This course will teach you where to go beyond the basics, with a look at HTTP traffic, forensic analysis and basic customization.