Network & Security Courses

bg
Sophos XG Firewall for Beginners-Part 2/2

Sophos XG Firewall for Beginners-Part 2/2

Mastering the Sophos Firewall v18.5

bg
FastAPI + React によるフルスタック Web開発

FastAPI + React によるフルスタック Web開発

Fast API, React, Mongo DBを使ったFARMスタックによるSPA開発 (JWT, httpOnly cookie...

bg
Introdução a serviços de rede Linux e Segurança na prática

Introdução a serviços de rede Linux e Segurança na prática

Fundamentos de administração de sistemas Linux, resolução de problemas e segurança

bg
Mikrotik - RouterBoard: Colocando para funcionar.

Mikrotik - RouterBoard: Colocando para funcionar.

Configurações Básicas de WAN, LAN e NAT

bg
Pentest Handbook: SQL Injection To Shell Uploading

Pentest Handbook: SQL Injection To Shell Uploading

Learning SQL Injection By Doing Complete Project including Detection, Exploiting...

bg
60 exercices corrigés et commentés pour réussir le CCNA

60 exercices corrigés et commentés pour réussir le CCNA

Et maitriser les concepts fondamentaux du réseaux

bg
Planning and Implementing a Security Incident Response

Planning and Implementing a Security Incident Response

Learn all about planning and implementing a Security Incident Response along wit...

bg
Microsoft Azure Security Services

Microsoft Azure Security Services

Learn all about the types of security services in Azure and their capabilities t...

bg
Primeiros Passos com o roteador Juniper MX204

Primeiros Passos com o roteador Juniper MX204

Como usufruir do equipamento seguindo as principais sugestões do fabricante.

bg
Seguridad en Linux: Introducción al firewall iptables

Seguridad en Linux: Introducción al firewall iptables

Aprende a utilizar el firewall más famoso de Linux

bg
Lunch And Learn: UFW Basics - The Uncomplicated Firewall

Lunch And Learn: UFW Basics - The Uncomplicated Firewall

Learn UFW Firewall Basics

bg
Cyber Security: Secure Passwords on Linux

Cyber Security: Secure Passwords on Linux

Learn GPG, Pass & Security Keys

bg
Security in Office 365

Security in Office 365

Learn all about the types of threats and the security solutions in Office 365 to...

bg
Informationssicherheit - Stärken Sie Ihre “Human Firewall”

Informationssicherheit - Stärken Sie Ihre “Human Firewall”

.. im Rahmen der ISO 27001 Zertifizierung oder bei KRITIS-Anforderungen

bg
Pentingnya Manajemen Risiko TI untuk Organisasi

Pentingnya Manajemen Risiko TI untuk Organisasi

Manajemen Risiko, TI, Keamanan

bg
Information Security Fundamentals (Best Starting Point)

Information Security Fundamentals (Best Starting Point)

Help safe guard your organisations assets ! Gain a real world understanding of t...

We use cookies to improve your experience on our site. By continuing to browse the site you are agreeing to our use of cookies Find out more here