Offensive Security
• Digital Forensics and Electronic Evidence
• Learn Ethical Hacking From Scratch
• The Complete Mobile Ethical Hacking Course
• Mobile Application Hacking and Penetration Testing (Android)
• OWASP: Threats Fundamentals
• Active Directory Pentesting Full Course - Red Team Hacking
• Risk Management 101 for IT Professionals: Essential Concepts
• Hacking and Pentesting Android Applications
• Ethical Hacking: Network Scan Nmap& Nessus| Network Security
• AWS Secure Landing Zone with Control Tower and AFT
• FortiGate Firewall NSE4 Version 7 Training Part2/2
• Cyber Security: Common Attacks
• Ethical Hacking / Penetration Testing & Bug Bounty Hunting
• Hacking and Securing Docker Containers v2.0
• MS-101 Microsoft 365 Mobility and Security Course with Sims
• Build a Secure Data Lake in AWS using AWS Lake Formation
• Microsoft Security Fundamentals
• Hacking and Securing JSON Web Tokens (JWT)
• Powershell Essential Training on Automation and Scripting
• Hacking and Pentesting iOS Applications
• Data Security strategy for organizations
• GDPR Privacy Data Protection CASE STUDIES (CIPT,CIPM, CIPP)
• Build Security Incident Response for GDPR data protection
• Android Hacking: Ethical Hacking for Android Apps & Devices
• Complete Web Application Hacking & Penetration Testing
• ISO/IEC 27001 : Information Security Controls Explained
• Network Hacking Continued - Intermediate to Advanced
• Certified Information Systems Security Officer (CISSO)
• The OWASP Top 10 - Deep Dive
• Red Team Ethical Hacking - Beginner
• Google Cloud Professional Cloud Security Engineer Exam 2023
• Learn Linux User Space Debugging
• An Introduction to PCI-DSS
• AWS Certified Advanced Networking Specialty Course [ANS-CO1]
• Oracle 12c Data Guard Administration
• Ethical Hacking: Ultimate Kit for Certification and Beyond
• Real-World Ethical Hacking: Hands-on Cybersecurity
• Ethical Hacking: Network Security & Network Layer Attack
• How to succeed in a Data Protection Officer Role (GDPR DPO)
• Offensive Security Engineering
• Practical Aspects of Information System Audit (For Beginner)
• CrowdStrike: Zero to Falcon Admin
• Introduction to SDN and OpenFlow
• Ethical Hacking with Metasploit: Exploit & Post Exploit
• A Guide to Security Information and Event Management - SIEM
• Red Team Ethical Hacking - Intermediate
• CCSP Domain 6 - Legal & Compliance
• OWASP Top10 2021 Web Application Security Made Simple
• CCNP,CCIE Security SCOR (350-701) Training Part-2/2
• Start Using Wireshark to Hack like a Pro
• The RedTeam Blueprint - A Unique Guide To Ethical Hacking
• IPv6 Internetworking Masterclass - Beginner to Advanced
• Hacking REST APIs - A beginner’s guide
• The Absolute Beginners Guide to Cyber Security - Part 4
• Certified Incident Handling Engineer (CIHE)
• Ethical Hacking/Penetration Testing & Bug Bounty Hunting v2
• WAF BASICS- Part1
• Uncle Rat’s Web Application Hacking And Bug Bounty Guide
• VMware NSX-T 3.0 Fundamentals Part One (2021)
• SC-300 : Microsoft Identity and Access Administrator
• Pentesting 101: The Ultimate Hacking Guide Start To Finish
• HPE Fortify - Secure Code Analysis
• CCSP-Cloud Security Professional-Important recap before Exam
• The Ultimate Wireshark Course
• Nmap: Network Security Scanning Basics & Advanced Techniques
• How To Hack The Box To Your OSCP (Part 3)
• Build Undetectable Malware Using C Language: Ethical Hacking
• Kali Linux Hacking Lab for Beginners
• Wi-Fi Hacking and Wireless Penetration Testing Course
• Web Security and Hacking for Beginners
• Complete Python 3 Ethical Hacking: Beginner To Advanced!