This course is a ‘Deep Dive’ into Kubernetes Security. You are guided through the concepts and best practices of Kubernetes Security, and hands-on examples are provided to apply what is covered.
Dive into the realm of cybersecurity with our updated Penetration Testing Professional learning path, tailored for those aspiring to master the art of ethical hacking and secure IT systems. This immersive path equips you with the expertise to uncover and mitigate vulnerabilities across various platforms, from web applications to wireless networks, and cloud environments. Through a blend of …
This course focuses on Open Source Intelligence (OSINT) tactics and techniques designed to help you improve your investigative game. Students should take this course if they are interested in:
Gaining a better understanding of OSINT techniques
This course focuses on the tools, techniques and procedures to monitor 802.11ac/n networks. We will be learning about both USB and Access Point hardware, pros and cons, and scalable architectures. We will be looking at different hardware for monitoring ranging in price from $40 to $350 and above, both USB and Access Point solutions.