top of page

Course Catalogue

  1. Cloud Security Web app security API Security

  2. Mobile App security

  3. IoT Security

  4. Red team – Offensive Security

  5. Detections

  6. Digital Forensics

  7. Threat Research

  8. CVE Analysis

  9. VAPT

  10. Blockchain Security

  11. Certified Ethical Hacker - CEHv10: Cloud Computer Attacks

  12. Certified Ethical Hacker - CEHv10: FootprintingCertified Ethical hacker - CEHv10: Tools to get startedCheckmarx

  13. OWASP A8 and A3: Cross-Site Attacks

  14. OWASP Overview

  15. Nessus

  16. CloudWatch

  17. Security group and access configurations in IAM

  18. Code Access

  19. Security and Cryptography in .NET

  20. Secure Programming: Encryption

  21. Ethical Hacker: Incident Response / Risk Assessment

  22. Authentication & Encryption: Best Practices

  23. CCSP 2019: Data Retention & Events

  24. Datadog

  25. Threat modeling

  26. Assessing Your Organization's Risks

  27. Identifying Risks in Your Organization

  28. Knowing When to Take Strategic Risks

  29. Responding Effectively to Risks

  30. AZ-305 - Microsoft Azure Infrastructure Solutions: Files Share

  31. Cloud Blockchains: Single Organization Networks on Amazon Managed Blockchain

  32. Certified Ethical Hacker - CEHv10: IoT Hacking and Countermeasures

  33. Certified Ethical Hacker - CEHv10: IoT Attacks

  34. Compliance Issues and Strategies: Data Compliance

  35. SSIS -Components,Packages,Security,Solutions

  36. Cloud App Testing

  37. Fortify software

  38. Certified Ethical hacker (CEH)

  39. CompTIA Security+, Network+

  40. Offensive Security Certified Professional (OSCP)

  41. Offensive Security Experienced Professional (OSEP)

  42. Certified Red team professional (CRTP)

  43. Cisco Certified Network Associate (CCNA), Cisco ASA firewall

  44. Basics of AI with cybersecurity

  45. Secure Implementation with AI

  46. Security Analysis with AI

  47. Security Engineering with AI

bottom of page