Cybersecurity, Ethical Hacking/Penetration Testing, Exploit Development, Malware Reverse Engineering, Digital Forensics and Incident Response Resources by Omar Santos.
The Art of Hacking is a series of on-demand video courses where you learn the key tenets of ethical hacking and security penetration testing techniques. These video courses provide step-by-step real-life scenarios.
This training helps candidates that are getting started in cybersecurity and those who are preparing for certifications such as CCNA CyberOps, CCNA Security, CompTIA Security+, CompTIA CySA+, CEH, CISSP, GSEC, and others.
Learn the details about Digital Forensics and Incident Response (DFIR). This training covers modern incident response techniques including threat hunting, how to effectively use threat intelligence, and how to perform computer forensics.
Live training (free with your Safari subscription) where you can learn from the fundamentals of ethical hacking (penetration testing) to advanced exploitation, evasion, and adversarial topics.
Learn the fundamentals of Cybersecurity. This training helps candidates that are getting started in cybersecurity and those who are preparing for certifications such as CCNA CyberOps, CCNA Security, CompTIA Security+, CompTIA CySA+, CEH, CISSP, GSEC, and others.
Access some of the training resources and references. From the fundamentals of cybersecurity to topics like cryptography, incident response, digital forensics, introduction to ethical hacking, how to become a security operation center (SOC) analyst and investigator, and more...
|SAFARI LIVE TRAINING COURSE|
|Cyber Security Fundamentals|
|Introduction to Ethical Hacking and Penetration Testing|
|Introduction to Digital Forensics and Incident Response (DFIR)|
|Cybersecurity Offensive and Defensive Techniques in 3 Hours|
|Certified Ethical Hacker (CEH) Certification Crash Course|
|CompTIA PenTest+ Certification Crash Course|
|Intense Introduction to Hacking Web Applications|
|Ethical Hacking Bootcamp with Hands-on Labs|
|Intense Introduction to Linux, Python, and Bash Scripting for Cybersecurity Professionals (Coming Soon!)|