Courses and Resources

To shape your learning path.

4. VoIP & SIP-Based Attacks
4. VoIP & SIP-Based Attacks
Read More
3. BGP Security Issues
3. BGP Security Issues
Read More
2. Email Protocols Security
2. Email Protocols Security
Read More
1. DNS Security & DNSSEC
1. DNS Security & DNSSEC
Read More
5. Cyber Conflict, Sovereignty & Norms
5. Cyber Conflict, Sovereignty & Norms
Read More
4. Lawful Interception
4. Lawful Interception
Read More
3. Intellectual Property & Digital Rights
3. Intellectual Property & Digital Rights
Read More
2. Cybercrime Legislation
2. Cybercrime Legislation
Read More
1. GDPR, HIPAA, and PCI-DSS
1. GDPR, HIPAA, and PCI-DSS
Read More
5. Audit Policies & Secure Configuration Baselines
5. Audit Policies & Secure Configuration Baselines
Read More
4. Memory Protections (ASLR, DEP)
4. Memory Protections (ASLR, DEP)
Read More
3. Patch and Configuration Management
3. Patch and Configuration Management
Read More
2. Kernel Security
2. Kernel Security
Read More
1. OS Isolation & Sandboxing
1. OS Isolation & Sandboxing
Read More
4. Cloud Threat Models
4. Cloud Threat Models
Read More
3. Virtual Networks & Security Groups
3. Virtual Networks & Security Groups
Read More
2. IAM in AWS-Azure-GCP
2. IAM in AWS-Azure-GCP
Read More
1. Shared Responsibility Models
1. Shared Responsibility Models
Read More
5. IoT Architectures & Attack Techniques
5. IoT Architectures & Attack Techniques
Read More
4. Bluetooth, NFC, RFID Threats
4. Bluetooth, NFC, RFID Threats
Read More
3. Mobile Malware & Rooting/Jailbreaking Risks
3. Mobile Malware & Rooting/Jailbreaking Risks
Read More