Companies Home Search Profile

Cyber Security - Learn Data Security & Combat Cyber Threats

Focused View

Peter Alkema,Digital Regenesys

8:12:39

112 View
  • 1 - Introduction.mp4
    04:38
  • 2 - Introduce Yourself To Your Fellow Students And Tell Everyone What Are Your Goals.html
  • 3 - Lets Celebrate Your Progress In This Course 25 50 75 100.mp4
    01:20
  • 3 - Lets-Celebrate-Your-Progress.pdf
  • 4 - Cyber-Security-Workbook.pdf
  • 4 - Preview The 87 Page Cyber Security Awareness Workbook You Get With This Course.mp4
    02:32
  • 5 - Cyber Security Course Overview.mp4
    00:45
  • 6 - Introduction of Facilitator.mp4
    02:42
  • 7 - Is our Data really safe on internet.mp4
    00:55
  • 7 - Is-our-Data-really-safe-on-internet.pdf
  • 8 - What is Cybersecurity.mp4
    01:20
  • 8 - What-is-Cybersecurity.pdf
  • 9 - Evolution of Cyber Threats.mp4
    03:41
  • 9 - Evolution-of-Cyber-Threats.pdf
  • 10 - Three Types of Security Goals.mp4
    05:12
  • 10 - Three-Types-of-Security-Goals.pdf
  • 11 - Importance of Cybersecurity.mp4
    03:21
  • 11 - Importance-of-Cybersecurity.pdf
  • 12 - Threat Vulnerability and Risk.mp4
    02:11
  • 12 - Threat-Vulnerability-and-Risk.pdf
  • 13 - Networking Devices Router.mp4
    02:19
  • 13 - Networking-Devices-Router.pdf
  • 14 - Networking Devices Switch.mp4
    01:40
  • 14 - Networking-Devices-Switch.pdf
  • 15 - What is an IP Address.mp4
    02:43
  • 15 - What-is-an-IP-Address.pdf
  • 16 - What is a MAC Address.mp4
    02:43
  • 16 - What-is-a-MAC-Address.pdf
  • 17 - What is a PORT Address.mp4
    02:16
  • 17 - What-is-a-PORT-Address.pdf
  • 18 - What is a DNS.mp4
    04:48
  • 18 - What-is-a-DNS.pdf
  • 19 - What is a VPN.mp4
    02:08
  • 19 - What-is-a-VPN.pdf
  • 20 - What is a Virus.mp4
    01:48
  • 20 - What-is-a-Virus.pdf
  • 21 - Learn Hacking and the different Types of Hackers.mp4
    04:38
  • 21 - Learn-Hacking-and-the-different-Types-of-Hackers.pdf
  • 22 - Job Profiles in the field of Cybersecurity.mp4
    01:27
  • 22 - Job-Profiles-in-the-field-of-Cybersecurity.pdf
  • 23 - Important Cybersecurity Skills.mp4
    05:36
  • 23 - Important-Cybersecurity-Skills.pdf
  • 24 - Fundamentals of NetworkingOverview.mp4
    00:55
  • 25 - Computer Networks.mp4
    02:29
  • 25 - Computer-Networks.pdf
  • 26 - The OSI Model.mp4
    03:26
  • 26 - The-OSI-Model.pdf
  • 27 - OSI Model Application Layer.mp4
    01:58
  • 27 - OSI-Model-Application-Layer.pdf
  • 28 - OSI Model Presentation Layer.mp4
    03:28
  • 28 - OSI-Model-Presentation-Layer.pdf
  • 29 - OSI Model Session Layer.mp4
    03:58
  • 29 - OSI-Model-Session-Layer.pdf
  • 30 - OSI Model Transport Layer.mp4
    04:53
  • 30 - OSI-Model-Transport-Layer.pdf
  • 31 - OSI Model Network Layer.mp4
    02:40
  • 31 - OSI-Model-Network-Layer.pdf
  • 32 - OSI Model Data Link Layer.mp4
    02:41
  • 32 - OSI-Model-Data-Link-Layer.pdf
  • 33 - OSI Model Physical Layer.mp4
    01:13
  • 33 - OSI-Model-Physical-Layer.pdf
  • 34 - OSI Layers Example.mp4
    01:03
  • 34 - OSI-Layers-Example.pdf
  • 35 - OSI Layers Protocols.mp4
    02:32
  • 35 - OSI-Layers-Protocols.pdf
  • 36 - HTTP Protocol.mp4
    10:00
  • 36 - HTTP-Protocol.pdf
  • 37 - Quarter-Complete-Well-Done-Keep-Going.pdf
  • 37 - Youve Achieved 25 Lets Celebrate Your Progress And Keep Going To 50.mp4
    00:24
  • 38 - TCP Protocol.mp4
    04:38
  • 38 - TCP-Protocol.pdf
  • 39 - UDP Protocol.mp4
    05:49
  • 39 - UDP-Protocol.pdf
  • 40 - Difference between UDP and TCP Protocol.mp4
    02:17
  • 40 - Difference-between-UDP-and-TCP-Protocol.pdf
  • 41 - DHCP Protocol.mp4
    09:20
  • 41 - DHCP-Protocol.pdf
  • 42 - ARP Protocol.mp4
    04:50
  • 42 - ARP-Protocol.pdf
  • 43 - What is an IP address and its types.mp4
    07:01
  • 43 - What-is-an-IP-address-and-its-types.pdf
  • 44 - What is a Port Address and its types.mp4
    04:10
  • 44 - What-is-a-Port-Address-and-its-types.pdf
  • 45 - Network Troubleshooting.mp4
    09:26
  • 45 - Network-Troubleshooting.pdf
  • 46 - What is an Attack.mp4
    02:54
  • 46 - What-is-an-Attack.pdf
  • 47 - Categories of Cyber Attacks.mp4
    09:07
  • 47 - Categories-of-Cyber-Attacks.pdf
  • 48 - Types of Attacks.mp4
    00:50
  • 48 - Types-of-Attacks.pdf
  • 49 - Password attack and its types.mp4
    09:33
  • 49 - Password-attack-and-its-types.pdf
  • 50 - Malware Attack.mp4
    01:41
  • 50 - Malware-Attack.pdf
  • 51 - Types of Malware Worms.mp4
    02:03
  • 51 - Worms.pdf
  • 52 - Types of Malware Viruses.mp4
    02:42
  • 52 - Viruses.pdf
  • 53 - Trojan.pdf
  • 53 - Types of Malware Trojan.mp4
    02:29
  • 54 - Adware.pdf
  • 54 - Types of Malware Adware.mp4
    02:33
  • 55 - Spyware.pdf
  • 55 - Types of Malware Spyware.mp4
    01:04
  • 56 - Crimeware.pdf
  • 56 - Types of Malware Crimeware.mp4
    02:12
  • 57 - Rootkit.pdf
  • 57 - Types of Malware Rootkit.mp4
    02:02
  • 58 - Ransomware.pdf
  • 58 - Types of Malware Ransomware.mp4
    03:28
  • 59 - Man in the Middle Attack.mp4
    03:42
  • 59 - Man-in-the-Middle-Attack.pdf
  • 60 - Man in the Middle Attack Example.mp4
    04:49
  • 60 - Man-in-the-Middle-Attack-Example.pdf
  • 61 - Sniffing Attack.mp4
    05:42
  • 61 - Sniffing-Attack.pdf
  • 62 - DOS Attack.mp4
    10:50
  • 62 - DOS-Attack.pdf
  • 63 - DOS Attack Example.mp4
    02:24
  • 63 - DOS-Attack-Example.pdf
  • 64 - What is DDOS Attack.mp4
    05:24
  • 64 - What-is-DDOS-Attack.pdf
  • 65 - DDOS Attack Example.mp4
    11:46
  • 65 - DDOS-Attack-Example.pdf
  • 66 - Phishing Attack.mp4
    07:40
  • 66 - Phishing-Attack.pdf
  • 67 - Phishing Attack Example.mp4
    01:27
  • 67 - Phishing-Attack-Example.pdf
  • 68 - SQL Injection Attack.mp4
    01:53
  • 68 - SQL-Injection-Attack.pdf
  • 69 - Example of SQL Injection Attack.mp4
    04:39
  • 69 - Example-of-SQL-Injection-Attack.pdf
  • 70 - Crosssite Scripting Attack.mp4
    06:16
  • 70 - Cross-site-Scripting-Attack.pdf
  • 71 - Post Scanning Attack.mp4
    07:20
  • 71 - Post-Scanning-Attack.pdf
  • 72 - What is Cryptology.mp4
    03:39
  • 72 - What-is-Cryptology.pdf
  • 73 - The Need for Cryptography.mp4
    03:13
  • 73 - The-Need-for-Cryptography.pdf
  • 74 - Basic Cryptography System.mp4
    05:23
  • 74 - Basic-Cryptography-System.pdf
  • 75 - What is Encryption.mp4
    01:48
  • 75 - What-is-Encryption.pdf
  • 76 - What is Decryption.mp4
    01:14
  • 76 - What-is-Decryption.pdf
  • 77 - Define Plain text.mp4
    00:35
  • 77 - Define-Plain-text.pdf
  • 78 - Half-Complete-Well-Done-Keep-Going.pdf
  • 78 - Youve Achieved 50 Lets Celebrate Your Progress And Keep Going To 75.mp4
    00:29
  • 79 - What is Secret Key.mp4
    00:42
  • 79 - What-is-Secret-Key.pdf
  • 80 - What is Cipher text.mp4
    01:21
  • 80 - What-is-Cipher-text.pdf
  • 81 - Cryptography System.mp4
    04:19
  • 81 - Cryptography-System.pdf
  • 82 - Cryptography in everyday life.mp4
    07:48
  • 82 - Cryptography-in-everyday-life.pdf
  • 83 - Types of Cryptography.mp4
    01:42
  • 83 - Types-of-Cryptography.pdf
  • 84 - Symmetric Key Cryptography.mp4
    06:35
  • 84 - Symmetric-Key-Cryptography.pdf
  • 85 - Asymmetric Key Cryptography.mp4
    08:50
  • 85 - Asymmetric-Key-Cryptography.pdf
  • 86 - What is Hashing.mp4
    06:42
  • 86 - What-is-Hashing.pdf
  • 87 - Hashing Algorithm.mp4
    02:08
  • 87 - Hashing-Algorithm.pdf
  • 88 - Techniques of Hashing.mp4
    10:34
  • 88 - Techniques-of-Hashing.pdf
  • 89 - What is Substitution Cipher.mp4
    04:54
  • 89 - What-is-Substitution-Cipher.pdf
  • 90 - What is Transposition Cipher.mp4
    02:11
  • 90 - What-is-Transposition-Cipher.pdf
  • 91 - Cesar Cipher and how it works.mp4
    07:46
  • 91 - Cesar-Cipher-and-how-it-works.pdf
  • 92 - Example of Cesar Cipher.mp4
    04:07
  • 92 - Example-of-Cesar-Cipher.pdf
  • 93 - Transposition Cipher.mp4
    01:41
  • 93 - Transposition-Cipher.pdf
  • 94 - Example of Transposition Cipher.mp4
    04:18
  • 95 - Stream Cipher.mp4
    04:33
  • 95 - Stream-Cipher.pdf
  • 96 - Block Cipher.mp4
    03:39
  • 96 - Block-Cipher.pdf
  • 97 - Advantages of Symmetric Key Cryptography.mp4
    02:13
  • 97 - Advantages-of-Symmetric-Key-Cryptography.pdf
  • 98 - Why Asymmetric key cryptography is important.mp4
    02:09
  • 98 - Why-Asymmetric-key-cryptography-is-important.pdf
  • 99 - Advantages of Asymmetric Key Cryptography.mp4
    03:25
  • 99 - Advantages-of-Asymmetric-Key-Cryptography.pdf
  • 100 - Digital Signature.mp4
    02:48
  • 100 - Digital-Signature.pdf
  • 101 - Signing and Verification Process.mp4
    05:38
  • 101 - Signing-and-Verification-Process.pdf
  • 102 - How to check the Integrity of a Message.mp4
    05:58
  • 102 - How-to-check-Integrity-of-Message.pdf
  • 103 - Security Measures.mp4
    03:33
  • 103 - Security-Measures.pdf
  • 104 - What is Firewall.mp4
    12:12
  • 104 - What-is-Firewall.pdf
  • 105 - Types of Firewall Packet Filter.mp4
    06:32
  • 105 - Types-of-Firewall-Packet-Filter.pdf
  • 106 - Types of Firewall Stateful Inspection Firewall.mp4
    05:04
  • 106 - Types-of-Firewall-Stateful-Inspection-Firewall.pdf
  • 107 - Types of Firewall Proxyserver firewall.mp4
    04:44
  • 107 - Types-of-Firewall-Proxy-server-firewall.pdf
  • 108 - Cyber Law.mp4
    03:18
  • 108 - Cyber-Law.pdf
  • 109 - Why there is a need for Cyber Law.mp4
    03:19
  • 109 - Why-there-is-a-need-for-Cyber-Law.pdf
  • 110 - What is Cyber Crime.mp4
    03:47
  • 110 - What-is-Cyber-Crime.pdf
  • 111 - Classification of Cyber Crime.mp4
    01:24
  • 111 - Classification-of-Cyber-Crime.pdf
  • 112 - Cyber Crimes Against Person Cyber Stalking.mp4
    02:24
  • 112 - Cyber-Crimes-Against-Person-Cyber-Stalking.pdf
  • 113 - Cyber Crimes Against Person Dissemination of obscene Material.mp4
    01:49
  • 113 - Cyber-Crimes-Against-Person-Dissemination-of-obscene-Material.pdf
  • 114 - Cyber Crimes Against Person Defamation.mp4
    01:16
  • 114 - Cyber-Crimes-Against-Person-Defamation.pdf
  • 115 - Cyber Crimes Against Person Hacking.mp4
    01:28
  • 115 - Cyber-Crimes-Against-Person-Hacking.pdf
  • 116 - Cyber Crimes Against Person Cracking.mp4
    02:45
  • 116 - Cyber-Crimes-Against-Person-Cracking.pdf
  • 117 - Cyber Crimes Against Person Email and SMS Spoofing.mp4
    03:54
  • 117 - Cyber-Crimes-Against-Person-Email-and-SMS-Spoofing.pdf
  • 118 - 3-Quarters-Complete-Well-Done-Keep-Going.pdf
  • 118 - Youve Achieved 75 Lets Celebrate Your Progress And Keep Going To 100.mp4
    00:31
  • 119 - Cyber Crimes Against Person Carding.mp4
    01:31
  • 119 - Cyber-Crimes-Against-Person-Carding.pdf
  • 120 - Cyber Crimes Against Person Cheating and Fraud.mp4
    04:24
  • 120 - Cyber-Crimes-Against-Person-Cheating-and-Fraud.pdf
  • 121 - Cyber Crimes Against Person Assault by Threat.mp4
    01:25
  • 121 - Cyber-Crimes-Against-Person-Assault-by-Threat.pdf
  • 122 - Cyber Crime Against Persons Property.mp4
    11:33
  • 122 - Cyber-Crime-Against-Persons-Property.pdf
  • 123 - Cyber Crime against Government.mp4
    05:44
  • 123 - Cyber-Crime-against-Government.pdf
  • 124 - Cyber Crime against Society at Large.mp4
    04:46
  • 124 - Cyber-Crime-against-Society-at-Large.pdf
  • 125 - Definition of Digital Forensics.mp4
    05:09
  • 125 - What-is-meant-by-term-Digital-Forensics.pdf
  • 126 - Process of Digital Forensics.mp4
    08:20
  • 126 - Process-of-Digital-Forensics.pdf
  • 127 - Types of Digital Forensics.mp4
    01:57
  • 127 - Types-of-Digital-Forensics.pdf
  • 128 - All-Complete-Well-Done.pdf
  • 128 - Youve Achieved 100 Lets Celebrate Remember To Share Your Certificate.mp4
    01:04
  • Description


    Cyber Threats, Attacks, Viruses, Security Measures, Cyber Crimes, Firewalls, Cyber Security Concepts, Digital Forensics

    What You'll Learn?


    • Explain the differences between Threat, Vulnerability, and Risk
    • Explore the needed skills set and job profiles in the field of Cybersecurity
    • Discuss the evolution of threats and the types of security goals
    • Define what cybersecurity is
    • Learn the Importance of Cybersecurity
    • Differentiate Networking Devices such as Router and Switch
    • Differentiate IP, MAC, and PORT Address
    • Define DNS and VPN
    • Learn Hacking and the different Types of Hackers
    • Learn the fundamentals of networking
    • Discuss the layers of the OSI Model
    • Explain the different networking protocols such as TCP, HTPP, UDP, ARP, and DHCP
    • How to troubleshoot a network
    • Learn the different types of attacks
    • Know the different types of malware
    • Explain the Man in the Middle and Denial of Service Attack
    • Discuss what is Distributed Denial of Service Attack
    • How to recognize Sniffing, Phishing, SQL Injection, Cross-site Scripting, and Post Scanning Attack
    • Define Cryptography and why we need it
    • Discuss important terminologies in Cryptography
    • Know the different types of ciphers
    • Learn the advantages and disadvantages of Symmetric and Asymmetric Keys
    • Learn what is Digital Signature and the Signing and Verification Process
    • Know how to check the Integrity of a Message
    • Discuss the different security measures
    • Learn the various types of firewalls
    • Learn Cyber Law and why there is a need for it
    • Discuss the classifications of cyber crime
    • Definition, Process, and Types of Digital Forensics
    • Create KALI Linux Virtual Machine in VMWARE

    Who is this for?


  • Those who are searching their career in cyber security.
  • Those who want to save their sensitive data from hackers
  • Those who want to become professional in cyber security
  • IT professionals and cyber security managers
  • What You Need to Know?


  • No requirement, we shall start from basic and end at advanced to become you pro in cyber security
  • Access to an internet connection, computer, and network
  • Must have ability to follow the step by step instructions during downloading and installation of software
  • Basic understanding of cyber security is a plus. However, this is not quite necessary
  • More details


    Description

    Get instant access to an 87-page workbook of Cyber Security Awareness

    Introduce yourself to our community of students in this course and tell us your goals

    Encouragement and celebration of your progress every step of the way: 25% > 50% > 75% & 100%

    8 hours of clear and concise step by step instructions, lessons, and engagement

    This course is designed for anyone who is interested in learning more about cyber security and how to combat the very real threats that everyone faces from hacking and catastrophic loss of data. This course is beginner-friendly, does not require technical cyber security skills, and is meant for everyone who wishes to help secure their own data, and their organisation's data from hackers and cyber threats.

    What  you will learn:

    • Define what cyber security is

    • Discuss the evolution of threats and the types of security goal

    • Learn the Importance of cyber security

    • Explain the differences between Threat, Vulnerability, and Risk

    • Differentiate Networking Devices such as Router and Switch

    • Differentiate IP, MAC, and PORT Address

    • Define DNS and VPN

    • Learn Hacking and the different Types of Hackers

    • Explore the needed skills set and job profiles in the field of cyber security

    • Learn the fundamentals of networking and security

    • Discuss the layers of the OSI Model

    • Explain the different networking protocols such as TCP, HTPP, UDP, ARP, and DHCP

    • How to troubleshoot a network to improve security

    • Learn the different  attacks

    • Know the different types of malware and how they affect security

    • Explain the Man in the Middle and Denial of Service Attack

    • Discuss what is Distributed Denial of Service Attack

    • How to recognize Sniffing, Phishing, SQL Injection, Cross-site Scripting, and Post Scanning Attack

    • Define Cryptography and why we need it for cyber security

    • Discuss important terminologies in Cryptography

    • Know the different ciphers

    • Learn the advantages and disadvantages of Symmetric and Asymmetric Keys

    • Learn what is Digital Signature and the Signing and Verification Process

    • Know how to check the Integrity of a Message

    • Discuss the different security measures

    • Learn the various types of firewalls and their security

    • Learn Cyber Law and why there is a need for it

    • Discuss the classifications of cyber crime

    • Definition, Process and Digital Forensics

    • ...and more!

    Contents and Overview

    You'll start with What is Cyber security; Evolution of Cyber Threats; Three Types of Security Goals; Importance of cyber security; Threat, Vulnerability, and Risk; Networking Devices such as Router and Switch; What is an IP Address; What is a MAC Address; What is a PORT Address; What is DNS and VPN; Learn Hacking and the different Types of Hackers; Job Profiles in the field of cyber security; Important cyber security Skills.

    Then you will learn about Computer Networks; The OSI Model; OSI Layers Protocols; HTTP Protocol; TCP Protocol; UDP Protocol; the Difference between UDP and TCP Protocol; DHCP Protocol; ARP Protocol; What is an IP address and its types; What is a Port Address and its types; Network Troubleshooting; What is an Attack; Categories of Cyber Attacks; Password attack and its types; Malware Attack; Types of Malware; Man in the Middle Attack; Sniffing Attack; DOS Attack; What is DDOS Attack; Phishing Attack; SQL Injection Attack; Example of SQL Injection Attack; Cross-site Scripting Attack; Post Scanning Attack.

    We will also cover Post Scanning Attack; The Need for Cryptography; Basic Cryptography System; What is Encryption; What is Decryption; Define Plain text; What is Secret Key; What is Cipher text; Cryptography System; Cryptography in everyday life; Types of Cryptography; Symmetric Key Cryptography; Asymmetric Key Cryptography; What is Hashing; Hashing Algorithm; Techniques of Hashing; What is Substitution Cipher; What is Transposition Cipher; Cesar Cipher and how it works; Transposition Cipher; Stream Cipher; Block Cipher; Advantages of Symmetric Key Cryptography; Why Asymmetric key cryptography is important; Advantages of Asymmetric Key Cryptography; Digital Signature; Signing and Verification Process; How to check the Integrity of a Message and increase security

    This course will also tackle Security Measures; What is a Firewall; Types of Firewall; Cyber Law; Why there is a need for  Cyber Law; What is Cyber Crime; Classification of Cyber Crime; Cyber Crimes Against Person; Cyber Crime Against Persons Property; Cyber Crime against Government; Cyber Crime against Society at Large; Definition of Digital Forensics; Process of Digital Forensics; Digital Forensics.

    Who are the Instructors?

    Vijal Jain is your lead instructor – a professional making a living from teaching cyber security. As a cyber security expert, she has joined with content creator Peter Alkema to bring you this amazing new course.

    You'll get premium support and feedback to help you become more confident with finance!

    Our happiness guarantee...

    We have a 30-day 100% money-back guarantee, so if you aren't happy with your purchase, we will refund your course - no questions asked!

    We can't wait to see you on the course!

    Enroll now, and we'll help you improve your cyber security !

    Peter and Digital Regenesys

    Who this course is for:

    • Those who are searching their career in cyber security.
    • Those who want to save their sensitive data from hackers
    • Those who want to become professional in cyber security
    • IT professionals and cyber security managers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Peter Alkema
    Peter Alkema
    Instructor's Courses
    In my courses you learn practical skills: "I feel like I am in a real classroom." - Kira Minehart "What an amazing course! After finishing this course, I have confidence. Thank so much Dr Peter Alkema". Or Tulongeni Shilunga: "This is exactly the jump-start I needed. Very clear and concise"I also help lead digital transformation at FirstRand, the biggest financial services group in Africa. I've been featured on CNBC Africa and won the Gartner CIO Of The Year in 2016. I founded and led the largest banking hackathon in South Africa which was published in 2019 as a case study by Harvard Business School.I've taught over 17,000 students about business, academics and self-development. In 2020 I completed my PhD at Wits University In Johannesburg. The study introduced a ground-breaking theory of Agile software development teams. My woodworking book was published in 2014 and has sold over 10,000 copies.Olugbenga Gbadegesin: "Excellent delivery" / Lebogang Tswelapele: "This is what I have been longing for" / Paskalia Ndapandula: "Peter speaks with so much clarity" / Amantle Mangwedi: "It was straight to the point and the sections are cut into nice short segments which made it easier to go through" Kathy Bermudez: "Excellent material. Well organized..."Werner van Wyk: "Thank you Peter, once again your lesson and course have given me so much knowledge and understanding" / Yvonne Rudolph "I really look forward to take everything i learned in action" / Josephine Mahlangu: "exactly what I needed to know, absolutely valuable and helpful for my personal growth"
    Digital Regenesys
    Digital Regenesys
    Instructor's Courses
    The ongoing digital revolution demands a new breed of professionals to succeed in the new digital world where new technologies have sparked rapid innovation.To give you a competitive advantage, we have developed cutting-edge digital technology programmes in the areas of information technology and management. Our programmes are facilitated by leading experts, entrepreneurs, and academics from top local and international institutions.Get inspired and energised to transform your career with programmes grounded in the realities of the new digital world.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 127
    • duration 8:12:39
    • Release Date 2022/11/26

    Courses related to Cyber Security

    Subtitle
    Specialized Testing: Deserialization
    Subtitle
    Fortinet FortiSOAR From Zero To Hero
    Udemy Hatem Metwally
    Hatem Metwally
    Fortinet FortiSOAR From Zero To Hero
    12:50:12
    English subtitles
    02/05/2024