1 |
Introduction to Ethical Hacking |
Course |
Basics of ethical hacking, laws, and ethical issues |
Networking, Programming |
CEH, CompTIA |
Beginner |
4.0 |
NaN |
IT Professionals |
2 |
Network Scanning Techniques |
Tutorial |
Learn methodologies for scanning networks |
Networking, Security Tools |
NaN |
Intermediate |
3.0 |
Nmap, Wireshark |
Ethical Hackers |
3 |
Web Application Penetration Testing |
Course |
Testing web applications for vulnerabilities |
Web Security, OWASP |
OWASP, CEH |
Intermediate |
10.0 |
Burp Suite |
Web Developers |
4 |
Malware Analysis |
Course |
Analyzing and dissecting malware samples |
Reverse Engineering |
GREM, CEH |
Advanced |
12.0 |
IDA Pro |
Malware Analysts |
5 |
Ethical Hacking Certification Preparation |
Bootcamp |
Prepare for ethical hacking certification exams |
Ethical Hacking, Security Concepts |
CEH |
Intermediate |
30.0 |
Varied |
Aspiring Ethical Hackers |
6 |
Social Engineering Techniques |
Article |
Understanding social engineering and its threats |
Psychology, Communication Skills |
NaN |
Intermediate |
2.0 |
NaN |
Security Awareness Trainers |
7 |
Incident Response Lifecycle |
Workshop |
Learn the phases of incident response |
Incident Management |
NaN |
Intermediate |
5.0 |
Varied |
Cybersecurity Teams |
8 |
Buffer Overflow Exploits |
Research Report |
Exploit techniques and prevention for buffer overflow |
Programming, Security Research |
NaN |
Advanced |
8.0 |
GDB |
Security Researchers |
9 |
Wireless Network Security |
Course |
Securing wireless networks against attacks |
Networking, Security Tools |
CWNP |
Intermediate |
6.0 |
Aircrack-ng |
Network Administrators |
10 |
Digital Forensics Fundamentals |
Course |
Introduction to digital forensics and investigation techniques |
Forensics, Legal Standards |
NaN |
Intermediate |
10.0 |
FTK, EnCase |
Forensics Professionals |
11 |
SQL Injection Techniques |
Tutorial |
Exploitation of SQL vulnerabilities and mitigation |
Database Management, Scripting |
NaN |
Intermediate |
5.0 |
SQLMap |
Web Developers |
12 |
Cyber Threat Intelligence |
Webinar |
Gathering and utilizing cyber threat intelligence |
Research, Analysis |
NaN |
Advanced |
2.0 |
Threat Analysis Tools |
Threat Analysts |
13 |
PenTesting with Kali Linux |
Course |
Utilizing Kali Linux for penetration testing |
Linux, PenTesting |
OSCP |
Intermediate |
20.0 |
Kali Linux |
Penetration Testers |
14 |
Risk Management Framework |
Workshop |
Implementing risk management in cybersecurity |
Risk Assessment, Management |
NaN |
Intermediate |
4.0 |
Risk Assessment Tools |
Cybersecurity Managers |
15 |
Phishing Awareness Training |
Training |
Identifying and mitigating phishing attacks |
Awareness, Email Security |
NaN |
Beginner |
1.0 |
NaN |
All Employees |
16 |
Cloud Security Essentials |
Course |
Understanding security in cloud computing environments |
Cloud Platforms, Compliance |
CCSP, AWS Certified Security |
Intermediate |
12.0 |
AWS, Azure |
Cloud Engineers |
17 |
Vulnerability Assessment Techniques |
Course |
Systems for assessing vulnerabilities in networks |
Security Tools, Networking |
NaN |
Intermediate |
8.0 |
Nessus, OpenVAS |
Security Analysts |
18 |
Mobile Application Security Testing |
Course |
Testing mobile applications for vulnerabilities |
Mobile Development, PenTesting |
NaN |
Advanced |
10.0 |
MobSF, OWASP |
Mobile Developers |
19 |
Cybersecurity Frameworks |
Workshop |
Implementing various cybersecurity frameworks in organizations |
Compliance, Risk Management |
NaN |
Advanced |
4.0 |
Framework Documentation |
IT Managers |
20 |
Incident Communication Strategies |
Training |
Best practices in communication during incidents |
Communication, Crisis Management |
NaN |
Intermediate |
3.0 |
NaN |
Crisis Managers |
21 |
Linux Security Basics |
Course |
Securing Linux systems in enterprise environments |
Linux, Security Policies |
NaN |
Beginner |
6.0 |
SELinux, AppArmor |
System Administrators |
22 |
Firewall Configuration Techniques |
Tutorial |
Setting up and managing firewalls effectively |
Networking, Security |
NaN |
Intermediate |
5.0 |
iptables, pfSense |
Network Engineers |
23 |
Threat Modeling Approaches |
Workshop |
Learn about threat modeling and its applications |
Risk Analysis, Security Design |
NaN |
Advanced |
5.0 |
Threat Modeling Tools |
Security Architects |
24 |
IoT Security Challenges |
Course |
Understanding the security implications of IoT devices |
Networking, Security |
NaN |
Intermediate |
8.0 |
IoT Security Tools |
IoT Developers |
25 |
Incident Response Playbook Development |
Workshop |
Creating playbooks for incident response |
SOP Development, Incident Management |
NaN |
Advanced |
6.0 |
Documentation Tools |
Cybersecurity Teams |
26 |
Cryptography Fundamentals |
Course |
Introduction to cryptography and its applications |
Mathematics, Security Protocols |
NaN |
Beginner |
8.0 |
Cryptography Tools |
All Levels |
27 |
Ethical Hacking Case Studies |
Research Paper |
Analysis of successful ethical hacking engagements |
Analytical Skills, Research |
NaN |
Intermediate |
7.0 |
Varied |
Cybersecurity Analysts |
28 |
Physical Security Measures |
Workshop |
Implementing physical security controls |
Security Management, Environment Assessment |
NaN |
Intermediate |
4.0 |
Security Cameras |
Facility Managers |
29 |
Understanding Ransomware |
Article |
Overview of ransomware and preventive measures |
Malware Analysis, Incident Response |
NaN |
Intermediate |
2.0 |
NaN |
IT Security Staff |
30 |
Data Breach Response Strategies |
Webinar |
Effective strategies for responding to data breaches |
Incident Response, Legal Compliance |
NaN |
Advanced |
1.5 |
NaN |
Compliance Officers |
31 |
OSINT Techniques for Hackers |
Course |
Open Source Intelligence gathering for ethical hackers |
Research, Tool Usage |
NaN |
Intermediate |
8.0 |
OSINT Tools |
Ethical Hackers |
32 |
Developing Security Policies |
Workshop |
Creating and managing effective security policies |
Policy Writing, Compliance |
CISSP, CISM |
Intermediate |
6.0 |
Documentation Tools |
Security Managers |
33 |
Incident Recovery Planning |
Course |
Planning for recovery post-incident |
Incident Management, Risk Recovery |
NaN |
Advanced |
6.0 |
NaN |
Business Continuity Planners |
34 |
Python for Penetration Testing |
Course |
Using Python for writing penetration testing scripts |
Programming, Scripting |
NaN |
Intermediate |
10.0 |
Python IDE |
Penetration Testers |
35 |
Security Auditing Techniques |
Workshop |
Methods for conducting security audits |
Auditing, Compliance |
NaN |
Advanced |
8.0 |
Auditing Tools |
Security Auditors |
36 |
Wireless Attacks and Defense |
Course |
Learning about wireless network attacks and defenses |
Networking, Security Protocols |
CWNA |
Intermediate |
6.0 |
Aircrack-ng |
Network Administrators |
37 |
Developing Incident Response Teams |
Workshop |
Creating effective incident response teams |
Team Management, Cybersecurity |
NaN |
Advanced |
5.0 |
NaN |
IT Leadership |
38 |
Red Team and Blue Team Exercises |
Training |
Understanding the roles of red teams and blue teams |
PenTesting, Defense Strategies |
NaN |
Advanced |
8.0 |
Simulation Tools |
Cybersecurity Teams |
39 |
Security Testing Automation |
Course |
Automating security testing processes |
Scripting, Tool Usage |
CISSP, OSCP |
Intermediate |
12.0 |
Automation Tools |
DevSecOps Teams |
40 |
Legal Aspects of Cybersecurity |
Webinar |
Understanding the legal implications of cybersecurity |
Law, Compliance |
NaN |
Advanced |
2.0 |
NaN |
Legal Teams |
41 |
Endpoint Protection Strategies |
Course |
Securing endpoints in an organizational setup |
Endpoint Security, Network Security |
NaN |
Intermediate |
8.0 |
EDR Tools |
System Administrators |
42 |
Ethical Hacking Lab Setup |
Tutorial |
Setting up a lab for ethical hacking |
Lab Management, Security Tools |
NaN |
Beginner |
4.0 |
Virtual Machines |
Aspiring Ethical Hackers |
43 |
Managing Security in Remote Work Environments |
Webinar |
Addressing challenges of remote work security |
Remote Work, Security Policies |
NaN |
Intermediate |
1.5 |
NaN |
IT Managers |
44 |
Integrated Security Solutions |
Workshop |
Implementing a holistic approach to security |
Integration, Compliance |
NaN |
Advanced |
5.0 |
Varied |
Security Managers |
45 |
Password Cracking Techniques |
Course |
Understanding password security and cracking techniques |
Cryptography, Scripting |
NaN |
Intermediate |
6.0 |
Hashcat |
Security Analysts |
46 |
Building Cybersecurity Awareness Programs |
Training |
Creating effective cyber awareness training programs |
Education, Security Awareness |
NaN |
Beginner |
3.0 |
NaN |
HR Professionals |
47 |
Cybersecurity Incident Lessons Learned |
Workshop |
Analyzing past incidents to improve future responses |
Incident Analysis, Reporting |
NaN |
Intermediate |
4.0 |
Incident Reports |
Cybersecurity Managers |
48 |
Understanding Zero Trust Architecture |
Course |
Introduction to zero trust security models |
Network Security, Architecture |
NaN |
Intermediate |
8.0 |
Network Modeling Tools |
IT Architects |
49 |
Creating a Cybersecurity Framework |
Course |
Building a tailored cybersecurity framework for your organization |
Security Compliance, Risk Management |
NaN |
Advanced |
10.0 |
Framework Documentation |
Cybersecurity Managers |
50 |
Monitoring and Logging for Security |
Tutorial |
Effective strategies for monitoring and logging for security events |
Networking, SIEM |
NaN |
Advanced |
7.0 |
SIEM Tools |
Security Analysts |
51 |
Incident Simulation Exercises |
Workshop |
Simulating security incidents to test response capabilities |
Simulation, Incident Management |
NaN |
Advanced |
4.0 |
Simulation Software |
Security Teams |
52 |
API Security Best Practices |
Course |
Securing APIs from common vulnerabilities |
Web Security, Development |
NaN |
Intermediate |
6.0 |
API Security Tools |
Developers |
53 |
Understanding DDoS Attacks |
Article |
Overview of DDoS attacks and prevention methods |
Networking, Security |
NaN |
Intermediate |
3.0 |
NaN |
Network Administrators |
54 |
A Guide to Cybersecurity Framework Compliance |
Webinar |
Understanding and complying with cybersecurity frameworks |
Compliance, Security Controls |
NaN |
Advanced |
1.5 |
NaN |
Compliance Officers |
55 |
Blockchain Security Essentials |
Course |
Basics of blockchain and its security implications |
Blockchain Technology, Security |
NaN |
Intermediate |
8.0 |
Blockchain Analysis Tools |
Developers |
56 |
Incident Handling for Digital Forensics |
Workshop |
Integrating incident handling with digital forensics |
Forensics, Security |
NaN |
Advanced |
5.0 |
Forensics Software |
Forensics Teams |
57 |
Understanding TLS/SSL Security |
Course |
Learn about TLS/SSL protocols and their importance |
Network Security, Cryptography |
NaN |
Intermediate |
6.0 |
NaN |
Web Developers |
58 |
Establishing a Threat Hunting Program |
Workshop |
Creating a proactive threat hunting strategy |
Threat Hunting, Analysis |
NaN |
Advanced |
4.0 |
Threat Hunting Tools |
Security Teams |
59 |
Cybersecurity Metrics and Reporting |
Training |
Defining and using metrics to report on cybersecurity posture |
Metrics, Reporting |
NaN |
Intermediate |
3.0 |
NaN |
CISO |
60 |
Building Incident Response Capability |
Course |
Developing your organization's incident response capability |
Incident Management, Planning |
NaN |
Advanced |
10.0 |
Response Tools |
Security Managers |
61 |
Implementing Security Information and Event Management (SIEM) |
Workshop |
Utilizing SIEM tools for security monitoring and analysis |
SIEM, Security Operations |
NaN |
Advanced |
5.0 |
SIEM Software |
Security Analysts |
62 |
Ethical Hacking Tools Overview |
Tutorial |
Exploring essential tools used in ethical hacking |
Tool Usage, Networking |
NaN |
Beginner |
4.0 |
Varied Tools |
Aspiring Ethical Hackers |
63 |
The Dark Web and Cybersecurity |
Course |
Exploring the implications of the dark web on security |
Dark Web, Cybersecurity |
NaN |
Advanced |
8.0 |
Monitoring Tools |
Security Analysts |
64 |
Cybersecurity Policy and Governance |
Workshop |
Understanding the importance of governance in cybersecurity |
Governance, Risk Management |
NaN |
Intermediate |
6.0 |
NaN |
Governance Officers |
65 |
Incident Command System in Cybersecurity |
Course |
Learn about the use of ICS in cybersecurity incidents |
Incident Management, ICS |
NaN |
Advanced |
7.0 |
NaN |
Incident Responders |
66 |
Tooling for Incident Response |
Tutorial |
Exploring various tools available for effective incident response |
Tool Knowledge, Security |
NaN |
Intermediate |
4.0 |
Response Tools |
IR Teams |
67 |
Privacy and Data Protection Principles |
Webinar |
Overview of privacy and data protection laws |
Legal, Compliance |
NaN |
Intermediate |
2.0 |
NaN |
Compliance Officers |
68 |
Understanding APTs (Advanced Persistent Threats) |
Course |
In-depth understanding of APT's and mitigation strategies |
Threat Intelligence, Security |
NaN |
Advanced |
10.0 |
Threat Detection Tools |
Threat Analysts |
69 |
Implementing Security Controls |
Workshop |
Best practices for implementing security controls in organizations |
Implementation, Security Policies |
CISSP |
Intermediate |
5.0 |
Security Control Tools |
Security Managers |
70 |
Basics of Cyber Hygiene |
Training |
Essential practices for maintaining good cyber hygiene |
Awareness, Best Practices |
NaN |
Beginner |
1.5 |
NaN |
All Employees |
71 |
Data Loss Prevention Strategies |
Course |
Methods and tools for preventing data loss |
Data Security, Compliance |
NaN |
Intermediate |
6.0 |
DLP Tools |
Data Security Officers |
72 |
Security Operations Center (SOC) Fundamentals |
Course |
Introduction to SOC functions and importance |
Security Operations, Monitoring |
NaN |
Intermediate |
10.0 |
SOC Management Tools |
Security Analysts |
73 |
Application Security Testing Methods |
Workshop |
Exploring various methods for application security testing |
Testing Methodologies, Security |
NaN |
Advanced |
5.0 |
Security Testing Tools |
App Security Teams |
74 |
Incident Response for Cloud Environments |
Course |
Handling incidents in cloud-based environments |
Cloud Security, Incident Management |
NaN |
Advanced |
8.0 |
Cloud Security Tools |
Cloud Security Teams |
75 |
Understanding Cyber Espionage |
Article |
Exploring the tactics and implications of cyber espionage |
Security Intelligence, Threat Modeling |
NaN |
Advanced |
2.0 |
NaN |
Cybersecurity Professionals |
76 |
Conducting Post-Incident Reviews |
Workshop |
Evaluating incidents to improve response and resilience |
Incident Management, Review Process |
NaN |
Advanced |
4.0 |
NaN |
Incident Response Teams |
77 |
Building Effective Security Culture |
Course |
Creating a culture of security within an organization |
Security Awareness, Culture Change |
NaN |
Intermediate |
6.0 |
NaN |
HR and Management |
78 |
Operationalizing Threat Intelligence |
Webinar |
Transforming threat intelligence into actionable security measures |
Threat Intelligence, Operations |
NaN |
Advanced |
1.5 |
NaN |
SOC Teams |
79 |
Security Metrics for Board Reporting |
Workshop |
Defining metrics suitable for board-level cybersecurity reporting |
Metrics, Board Communications |
NaN |
Intermediate |
3.0 |
NaN |
CISOs |
80 |
Digital Forensics Tool Overview |
Course |
Exploring tools commonly used in digital forensics |
Forensics, Tool Usage |
NaN |
Intermediate |
6.0 |
Forensic Tools |
Forensics Teams |
81 |
Developing a Cyber Incident Response Team (CIRT) |
Course |
Steps to develop an effective cyber incident response team |
CIRT, Team Management |
NaN |
Advanced |
7.0 |
NaN |
Cybersecurity Teams |
82 |
Understanding Insider Threats |
Webinar |
Exploration of insider threats and mitigation strategies |
Insider Threats, Security |
NaN |
Intermediate |
1.5 |
NaN |
Security Analysts |
83 |
Understanding Security Compliance Requirements |
Course |
Overview of compliance requirements in cybersecurity |
Compliance, Legal |
NaN |
Advanced |
8.0 |
Compliance Tools |
Compliance Officers |
84 |
Introduction to Threat Hunting |
Course |
Introduction to the concepts and methodologies of threat hunting |
Threat hunting, Security Analysis |
NaN |
Intermediate |
10.0 |
Threat Hunting Tools |
Security Teams |
85 |
Network Forensics Techniques |
Workshop |
Methods for conducting network forensics investigations |
Forensics, Networking |
NaN |
Advanced |
5.0 |
Forensics Tools |
Forensics Professionals |
86 |
Building a Business Continuity Plan |
Workshop |
Creating effective business continuity and disaster recovery plans |
Planning, Recovery Strategies |
NaN |
Advanced |
6.0 |
BCP Tools |
Business Continuity Planners |
87 |
Understanding Cybersecurity Risk Assessment |
Course |
Comprehensive guide on conducting cybersecurity risk assessments |
Risk Management, Compliance |
NaN |
Intermediate |
6.0 |
Risk Assessment Tools |
Security Teams |
88 |
Managing Vulnerabilities in IT Infrastructure |
Course |
Techniques for vulnerability management in IT environments |
Vulnerability Management, Security |
NaN |
Intermediate |
8.0 |
Vulnerability Scanners |
IT Managers |
89 |
Legal Compliance in Cybersecurity |
Webinar |
Exploring legal compliance aspects within cybersecurity |
Compliance, Legal |
NaN |
Intermediate |
2.0 |
NaN |
Compliance Teams |
90 |
Incident Response Testing Techniques |
Workshop |
Testing and validating incident response capabilities |
Incident Management, Testing |
NaN |
Advanced |
5.0 |
Testing Tools |
IR Teams |
91 |
Cloud Incident Response Best Practices |
Course |
Best practices for managing incidents in cloud environments |
Cloud Security, Incident Management |
NaN |
Advanced |
8.0 |
Cloud Tools |
Cloud Security Teams |
92 |
Understanding Red Teams and Blue Teams |
Course |
Overview of red teaming and blue teaming methodologies |
Security, Testing |
NaN |
Intermediate |
10.0 |
Simulation Tools |
Cybersecurity Teams |
93 |
Tips for Securing Remote Workforces |
Webinar |
Strategies for securing remote work environments |
Remote Work, Security Policies |
NaN |
Intermediate |
1.5 |
NaN |
All Employees |
94 |
Understanding the Cyber Kill Chain |
Workshop |
Explaining the stages of an attack and defense strategies |
Security Operations, Defense |
NaN |
Intermediate |
3.0 |
NaN |
Security Analysts |
95 |
Creating Effective Incident Response Documents |
Training |
Documenting incident response processes and checklists |
Documentation, Incident Management |
NaN |
Intermediate |
3.0 |
Documentation Tools |
Incident Response Teams |
96 |
Advanced Malware Analysis Techniques |
Course |
Deep dive into techniques for analyzing sophisticated malware |
Malware Analysis, Reverse Engineering |
NaN |
Advanced |
10.0 |
Malware Analysis Tools |
Malware Analysts |
97 |
Security Awareness for Employees |
Course |
Training programs to raise employee awareness of security practices |
Awareness, Compliance |
NaN |
Beginner |
5.0 |
NaN |
All Employees |
98 |
Managing Third-Party Risk |
Workshop |
Best practices for managing risks associated with third-party vendors |
Risk Management, Compliance |
NaN |
Intermediate |
4.0 |
Risk Management Tools |
Vendor Management Teams |
99 |
Introduction to Cybersecurity Tools |
Tutorial |
Overview of essential tools in cybersecurity operations |
Tool Usage, Security |
NaN |
Beginner |
4.0 |
Varied Tools |
Aspiring Cybersecurity Professionals |
100 |
Developing Incident Response Protocols |
Course |
Creating and implementing incident response protocols |
Incident Management, Documentation |
CISSP |
Advanced |
6.0 |
Response Tools |
IT Security Teams |