Kuba Czubajewski OfficialNew Edition

Post-AI Marketing – More Human than Ever

At the end of 2022, I thought I was out of a job. That’s when I first logged into ChatGPT …

Jul 28,2023

8 min read

Chirath De Alwis, Sulaksha Punsara Jayawikrama, H.A.Neelaka Nilakshana, Chamith Sandaru Bandara, Sheruni Pilapitiya, Rusiru Kashmeera OfficialNew Edition

The Development of Zero Trust Security

A Robust Cybersecurity Framework Introduction In a world where cybersecurity threats continue to evolve and breach traditional defense mechanisms, a …

Jul 28,2023

18 min read

Chirath De Alwis, Nipuna Manujaya, Mohamed Sinan, Singha Dulain OfficialNew Edition

Security of Zero Trust

Introduction In today's digital age, where cyber threats loom large and data breaches make headlines far too often, the need …

Jul 28,2023

24 min read

Manish Mradul OfficialNew Edition

Privacy: Protecting your personal information Online

With the growth of technology, the ways of marketing have observed a paradigm shift. In the past, the marketing agencies …

Jul 28,2023

10 min read

1
Nancy Kapila OfficialNew Edition

Healthcare Cybersecurity - Q&A with Roots Analysis

Digital technologies have become an integral part of the healthcare sector for disease diagnosis, management, and treatment. The revolution in …

Feb 13,2024

11 min read

Miklos Tomka and Isabella Leandersson, Parsimoni and Tarides OfficialNew Edition

Space Oddities: What is ‘Secure-by-Design’ and Why Does it Matter for Satellites?

Cybersecurity is a hot-button issue in all technology sectors. Hackers are constantly competing against the technologies aimed at stopping them, …

Feb 12,2024

10 min read

Mohammed Ilyas Ahmed OfficialNew Edition

Securing Healthcare: Safeguarding Patient Data within the Cybersecurity Sphere

In the healthcare industry, keeping your data safe is like playing hide and seek with a mischievous toddler – you …

Feb 12,2024

18 min read

Ross Moore OfficialNew Edition

Guarding Against Cyber Threats: Tools and Techniques for the New Year

The Right Toolbox Every hacker needs the right tools – programs and scripts – to help discover and exploit weaknesses …

Feb 12,2024

19 min read

1
Afshan Naqvi Course

AWS Security Essentials: Building a Resilient Cloud Defense (W74)

"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.

Nov 16,2023

12 min read

Rausson Gouveia Course

Create Your Own Command & Control Tool with Golang (W73)

Enter a short description of the course.

Oct 04,2023

6 min read

Kate Libby Course

Kismet Wireless: Network Monitoring and Analysis (W72)

COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …

Sep 14,2023

9 min read

Youssef Khaoulaj Course

Web Application Penetration Testing (W71)

Enter a short description of the course.

Aug 30,2023

8 min read

1
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.