Haqqani Salim, Oshadi Amarasinghe & Shamas Sulaiman, Lochana OfficialNew Edition

Navigating Future Cybersecurity Threat - Data Poisoning AI Integration and Quantum Computing

In the ever-evolving landscape of cybersecurity, the challenges presented are as diverse as they are daunting. From traditional cyber threats …

Dec 06,2023

6 min read

Seneja & Jayani, Lochana OfficialNew Edition

Guardians of the Digital Realm: The Role of AI in Combating Ransomware Threats

Ransomware is a sort of malicious software (malware) that encrypts a victim's files or locks them out of their machine …

Dec 05,2023

9 min read

Dr. Berker KILIC OfficialNew Edition

Cyber Warfare Methodologies and Case Studies

Introduction In the ever-evolving landscape of modern conflict, cyber warfare methodologies have emerged as powerful tools in the arsenals of …

Nov 29,2023

9 min read

Afshan NaqviCourse

AWS Security Essentials: Building a Resilient Cloud Defense (W74)

"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.

Nov 16,2023

7 min read

Matthew Maynard OfficialNew Edition

Hook, Line and Cyber: Navigating the waters of Phishing

Phishing is a type of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware. …

Nov 22,2023

7 min read

Haqqani Salim, Oshadi Amarasinghe & Shamas Sulaiman, Lochana OfficialNew Edition

Navigating Future Cybersecurity Threat - Data Poisoning AI Integration and Quantum Computing

In the ever-evolving landscape of cybersecurity, the challenges presented are as diverse as they are daunting. From traditional cyber threats …

Dec 06,2023

6 min read

Seneja & Jayani, Lochana OfficialNew Edition

Guardians of the Digital Realm: The Role of AI in Combating Ransomware Threats

Ransomware is a sort of malicious software (malware) that encrypts a victim's files or locks them out of their machine …

Dec 05,2023

9 min read

Dr. Berker KILIC OfficialNew Edition

Cyber Warfare Methodologies and Case Studies

Introduction In the ever-evolving landscape of modern conflict, cyber warfare methodologies have emerged as powerful tools in the arsenals of …

Nov 29,2023

9 min read

Matthew Maynard OfficialNew Edition

Hook, Line and Cyber: Navigating the waters of Phishing

Phishing is a type of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware. …

Nov 22,2023

7 min read

1
Afshan Naqvi Course

AWS Security Essentials: Building a Resilient Cloud Defense (W74)

"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.

Nov 16,2023

12 min read

Rausson Gouveia Course

Create Your Own Command & Control Tool with Golang (W73)

Enter a short description of the course.

Oct 04,2023

6 min read

Kate Libby Course

Kismet Wireless: Network Monitoring and Analysis (W72)

Welcome to the In-Depth Course on Kismet Wireless! This comprehensive course is designed to provide you with a deep understanding …

Sep 14,2023

9 min read

Youssef Khaoulaj Course

Web Application Penetration Testing (W71)

Enter a short description of the course.

Aug 30,2023

8 min read

1
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023

Watch the rest of this video with a free account.

Already have an account? Sign in

What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.