Is Your Home Safe From Hackers? |Infographic by Who is Hosting This?
Hackers were never so powerful as they were in the 1990s movies. By furiously typing on their keyboards, they could …
Help us make amazing Hakin9 Labs - Survey
Hi folks! How are you doing? Today we would like to present you with something different. We want to activate …
"I always tell people: learn a programming language that will help you achieve your goals" - Interview with Laurence Bradford, the creator of Learn to Code With Me
Hi Folks! Today we present you an amazing interview with Laurence Bradford, the creator of Learn to Code With Me. …
"From a curious kid to geek. Geek to Hacker. But ethics do really matter." - interview with Akhil Reni, Co-Founder at We Secure App
Hi folks! We have another great interview for you! This time Akhil Reni, Co-Founder at We Secure App presented his …
Reconnaissance - Questions and Answers with Gilbert Oviedo
Can you explain the concept of the reconnaissance phase in the cyber kill chain? Why is it critical to cyber …
Dark Web Reconnaissance: The Art of Uncovering the Hidden Adversaries
Introduction The cyber kill chain is the intelligence-driven defense framework developed by Lockheed Martin. It is a seven-stage model that …
Strategies for Defending Against Kill Chain Reconnaissance
Introduction Recent cyberattacks attributed to advanced persistent threat (APT) groups linked with nation-states have exposed their expanding capabilities when it …
Security Implications of Serverless Computing in the Cloud
Abstract The promise of easier development, scalability, and cost-effectiveness has made serverless computing quite popular in recent years. But this …
AWS Security Essentials: Building a Resilient Cloud Defense (W74)
"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.
Create Your Own Command & Control Tool with Golang (W73)
Enter a short description of the course.
Kismet Wireless: Network Monitoring and Analysis (W72)
COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …