Courses and Resources

To shape your learning path.

4. EDR Telemetry Analysis
4. EDR Telemetry Analysis
Read More
3. SIEM Correlation Rules
3. SIEM Correlation Rules
Read More
2. MITRE ATT&CK for Detection Engineering
2. MITRE ATT&CK for Detection Engineering
Read More
1. Hypothesis-Driven Hunting
1. Hypothesis-Driven Hunting
Read More
5. Monitoring & Observability
5. Monitoring & Observability
Read More
4. Zero-Trust in Distributed Environments
4. Zero-Trust in Distributed Environments
Read More
3. API Gateways & Identity Brokering
3. API Gateways & Identity Brokering
Read More
2. Distributed systems attack vectors
2. Distributed systems attack vectors
Read More
1. Cloud-Native Security (Kubernetes & Serverless)
1. Cloud-Native Security (Kubernetes & Serverless)
Read More
4. Control Testing & Assurance Reporting
4. Control Testing & Assurance Reporting
Read More
3. Evidence Gathering & Documentation
3. Evidence Gathering & Documentation
Read More
2. Internal vs External Audits
2. Internal vs External Audits
Read More
1. Audit Methodologies (COBIT, NIST, ISO)
1. Audit Methodologies (COBIT, NIST, ISO)
Read More
4. Metrics, KPIs & Continuous Improvement
4. Metrics, KPIs & Continuous Improvement
Read More
3. SOC, SIEM & Security Operations Management
3. SOC, SIEM & Security Operations Management
Read More
2. Policies, Procedures & Governance Models
2. Policies, Procedures & Governance Models
Read More
1. ISO/IEC 27001 Controls & Implementation
1. ISO/IEC 27001 Controls & Implementation
Read More
4. Threat Modeling for Enterprise Systems
4. Threat Modeling for Enterprise Systems
Read More
3. Micro-Segmentation
3. Micro-Segmentation
Read More
2. Zero Trust Network Architecture (ZTNA)
2. Zero Trust Network Architecture (ZTNA)
Read More
1. Security Architecture Frameworks (SABSA & TOGAF)
1. Security Architecture Frameworks (SABSA & TOGAF)
Read More