YoVDO

Cybersecurity Courses

Hands-on with Top Ethical Hacking Tools
Udemy
Mitigate Threats Using Microsoft 365 Defender
Pluralsight
Utilizing Zeek in an Enterprise Environment or for Distributed Operations
Pluralsight
OS Analysis with Volatility
Pluralsight
Reconnaissance with Shodan
Pluralsight
Payment Card Security, Processing, and the PCI Standards
Pluralsight
Lateral Movement with CrackMapExec
Pluralsight
Privilege Escalation with Rubeus
Pluralsight
Dridex Banking Trojan
Pluralsight
Reconnaissance with OWASP Amass
Pluralsight
< Prev Page 61 Next >