Cyber Counter-Terrorism: Shutdown
Breaking through the vulnerabilities of fear From here, a perspective will be addressed regarding the power of information security as …
Changing Passwords Regularly is Doing More Harm Than Good
Changing Passwords Regularly is Doing More Harm Than Good How often do you change your passwords? Every month? Every year? …
Cybercrime and Cybersecurity – The Legal and Regulatory Environment by Colin Renouf
In this article we will look at the environment in which eForensics exists; the legal and regulatory regimes in which systems and cyber criminals operate. We perform forensic analysis on systems to investigate a crime and hopefully prosecute a criminal; but to do that we need to understand which laws and regulations have been broken. There are pitfalls in working out what laws and regulations are in operation for a particular context; as what is illegal in one regime may not be in another, and is it the law in the location of the system or the criminal that applies? The information here forms the underlying legal knowledge in the CISSP certification and underpins the International Information Systems Security Certification Consortium (ISC)2 body of knowledge.

Cyber Warfare Methodologies and Case Studies
Introduction In the ever-evolving landscape of modern conflict, cyber warfare methodologies have emerged as powerful tools in the arsenals of …
Hook, Line and Cyber: Navigating the waters of Phishing
Phishing is a type of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware. …
Space Cyber Hacking
About the Author Sylvester Kaczmarek works on secure, interpretable, and explainable intelligence capabilities and next-generation secure data management for machines. …
Overview of Data privacy in the Middle East
It is already a known fact that the risks increase as we become more technology dependent. During the last decades, …

AWS Security Essentials: Building a Resilient Cloud Defense (W74)
"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.
Create Your Own Command & Control Tool with Golang (W73)
Enter a short description of the course.
Kismet Wireless: Network Monitoring and Analysis (W72)
Welcome to the In-Depth Course on Kismet Wireless! This comprehensive course is designed to provide you with a deep understanding …
Web Application Penetration Testing (W71)
Enter a short description of the course.
