Offensive Security

• Digital Forensics and Electronic Evidence

• Learn Ethical Hacking From Scratch

• The Complete Mobile Ethical Hacking Course

• Mobile Application Hacking and Penetration Testing (Android)

• OWASP: Threats Fundamentals

• Active Directory Pentesting Full Course - Red Team Hacking

• Risk Management 101 for IT Professionals: Essential Concepts

• Hacking and Pentesting Android Applications

• Ethical Hacking: Network Scan Nmap& Nessus| Network Security

• AWS Secure Landing Zone with Control Tower and AFT

• FortiGate Firewall NSE4 Version 7 Training Part2/2

• Cyber Security: Common Attacks

• Ethical Hacking / Penetration Testing & Bug Bounty Hunting

• Hacking and Securing Docker Containers v2.0

• MS-101 Microsoft 365 Mobility and Security Course with Sims

• Build a Secure Data Lake in AWS using AWS Lake Formation

• Microsoft Security Fundamentals

• Hacking and Securing JSON Web Tokens (JWT)

• Powershell Essential Training on Automation and Scripting

• Hacking and Pentesting iOS Applications

• Data Security strategy for organizations

• GDPR Privacy Data Protection CASE STUDIES (CIPT,CIPM, CIPP)

• Build Security Incident Response for GDPR data protection

• Android Hacking: Ethical Hacking for Android Apps & Devices

• Complete Web Application Hacking & Penetration Testing

• ISO/IEC 27001 : Information Security Controls Explained

• Network Hacking Continued - Intermediate to Advanced

• Certified Information Systems Security Officer (CISSO)

• The OWASP Top 10 - Deep Dive

• Red Team Ethical Hacking - Beginner

• Google Cloud Professional Cloud Security Engineer Exam 2023

• Learn Linux User Space Debugging

• An Introduction to PCI-DSS

• AWS Certified Advanced Networking Specialty Course [ANS-CO1]

• Oracle 12c Data Guard Administration

• Ethical Hacking: Ultimate Kit for Certification and Beyond

• Real-World Ethical Hacking: Hands-on Cybersecurity

• Ethical Hacking: Network Security & Network Layer Attack

• How to succeed in a Data Protection Officer Role (GDPR DPO)

• Offensive Security Engineering

• Practical Aspects of Information System Audit (For Beginner)

• CrowdStrike: Zero to Falcon Admin

• Introduction to SDN and OpenFlow

• Ethical Hacking with Metasploit: Exploit & Post Exploit

• A Guide to Security Information and Event Management - SIEM

• Red Team Ethical Hacking - Intermediate

• CCSP Domain 6 - Legal & Compliance

• OWASP Top10 2021 Web Application Security Made Simple

• CCNP,CCIE Security SCOR (350-701) Training Part-2/2

• Start Using Wireshark to Hack like a Pro

• The RedTeam Blueprint - A Unique Guide To Ethical Hacking

• IPv6 Internetworking Masterclass - Beginner to Advanced

• Hacking REST APIs - A beginner’s guide

• The Absolute Beginners Guide to Cyber Security - Part 4

• Certified Incident Handling Engineer (CIHE)

• Ethical Hacking/Penetration Testing & Bug Bounty Hunting v2

• WAF BASICS- Part1

• Uncle Rat’s Web Application Hacking And Bug Bounty Guide

• VMware NSX-T 3.0 Fundamentals Part One (2021)

• SC-300 : Microsoft Identity and Access Administrator

• Pentesting 101: The Ultimate Hacking Guide Start To Finish

• HPE Fortify - Secure Code Analysis

• CCSP-Cloud Security Professional-Important recap before Exam

• The Ultimate Wireshark Course

• Nmap: Network Security Scanning Basics & Advanced Techniques

• How To Hack The Box To Your OSCP (Part 3)

• Build Undetectable Malware Using C Language: Ethical Hacking

• Kali Linux Hacking Lab for Beginners

• Wi-Fi Hacking and Wireless Penetration Testing Course

• Web Security and Hacking for Beginners

• Complete Python 3 Ethical Hacking: Beginner To Advanced!