Information and Cyber Security GRC: Risk Management Frameworks and Structures

Information and Cyber Security GRC: Risk Management Frameworks and Structures

All organizations face varying risks related to their mission, strategies, and goals. In this course, Information and Cyber Security GRC: Risk Management Frameworks and Structures, you’ll learn to use risk management techniques. First, you’ll explore quantitative and qualitative risk techniques. Next, you’ll discover how to identify organizational factors to influence Read more…

Threat Hunt with PowerShell

Threat Hunt with PowerShell

When performing threat hunting exercises, as a security professional, there needs to be a method to the madness in order to ensure constant improvements are being made to your security stance. In this course, Threat Hunt with PowerShell, you’ll learn to apply MITRE TTPs in a real-world setting with PowerShell. Read more…

Pen Testing with Bash

Pen Testing with Bash

Bash is a widely-used and highly regarded tool for shell scripting and command line interface operations. It is known for its versatility, robustness, and standardization across Unix-like operating systems. In this course, Pen Testing with Bash, you’ll learn to utilize this powerful tool for pen testing. First, you’ll explore reconnaissance Read more…