Cybersecurity Courses
Udemy Mitigate Threats Using Microsoft 365 Defender
Pluralsight Utilizing Zeek in an Enterprise Environment or for Distributed Operations
Pluralsight OS Analysis with Volatility
Pluralsight Reconnaissance with Shodan
Pluralsight Payment Card Security, Processing, and the PCI Standards
Pluralsight Lateral Movement with CrackMapExec
Pluralsight Privilege Escalation with Rubeus
Pluralsight Dridex Banking Trojan
Pluralsight Reconnaissance with OWASP Amass
Pluralsight