0% found this document useful (0 votes)
68 views6 pages

COURSE-LIST v3

Uploaded by

goku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views6 pages

COURSE-LIST v3

Uploaded by

goku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 6

SOURCE CODE

SANS AUD507

SANS FOR500
SANS FOR508

SANS FOR509
SANS FOR518
SANS FOR572

SANS FOR608
SANS FOR610

SANS FOR710
SANS ICS410
SANS MGT551
SANS SEC401
SANS SEC401
SANS SEC450
SANS SEC488
SANS SEC501
SANS SEC503
SANS SEC504
SANS SEC510
SANS SEC511
SANS SEC522
SANS SEC530
SANS SEC537
SANS SEC540
SANS SEC550

SANS SEC554
SANS SEC555
SANS SEC556
SANS SEC566
SANS SEC595

SANS SEC599

SANS SEC699

SANS SEC760
SANS SEC573
Antisyphon
Applied Network Defense
Antisyphon

Antisyphon
SecurityOnionSolutions
Antisyphon
Antisyphon
SANS ICS515
Antisyphon
CQURE
CQURE
SANS FOR578
SANS MGTT414
SANS SEC575
SANS SEC660

SANS SEC642

SANS SEC506
SANS SEC542
SANS SEC545
SANS SEC564
SANS SEC552
SANS SEC526
SANS MGT514
Applied Network Defense
SANS SEC588
SANS SEC487
SANS SEC505
Applied Network Defense
Kaspersky xTraining
Applied Network Defense
Applied Network Defense
Kaspersky xTraining
Monnappa
Zeropoint
Antisyphon
Antisyphon
Antisyphon
COURSE YEAR VERSION PDF
AUD507: Auditing & Monitoring Networks, Perimeters & Systems 2021 G01_03

Windows Forensic Analysis 2021 G01_01


Advanced Incident Response, Threat Hunting, and Digital Forensics 2021 F01_05

Enterprise Cloud Forensics and Incident Response 2021 G01_01


Mac and iOS Forensic Analysis and Incident Response 2021 F02
Advanced Network Forensics: Threat Hunting, Analysis, and Incident 2021 G01_02
Response
Enterprise-Class Incident Response & Threat Hunting 2022 H01_01
Reverse-Engineering Malware: Malware Analysis Tools and 2020 F01_05
Techniques
Reverse-Engineering Malware: Advanced Code Analysis 2022 H02_05
ICS/SCADA Security Essentials 2021 F01_05
MGT551: Building and Leading Security Operations Centers 2021 G02_02
Security Essentials - Network, Endpoint, and Cloud 2021 G01_03
Security Essentials Bootcamp Style 2020 F02_03
Blue Team Fundamentals: Security Operations and Analysis 2020 F01_01
Cloud Security Essentials 2021 F03_01
Advanced Security Essentials - Enterprise Defender 2021 F01_01
Network Monitoring and Threat Detection In-Depth 2021 F01_07
Hacker Tools, Techniques, and Incident Handling 2021 F01_01
Public Cloud Security: AWS, Azure, and GCP 2021 G01_01
Continuous Monitoring and Security Operations 2021 F01_02
Defending Web Application Security Essentials 2020 F01_02
Defensible Security Architecture and Engineering: Implementing Zero 2020 E01_02
Trust for OSINT
Practical the Hybrid Enterprise
Analysis 2021 G02_02
Cloud Security and DevSecOps Automation 2020 F01_03
Cyber Deception - Attack Detection, Disruption and Active Defense 2022 H02_01

Blockchain and Smart Contract Security 2021 G02_01


SIEM with Tactical Analytics 2021 G01_01
IoT Penetration Testing 2022 G02_02
Implementing and Auditing CIS Critical Controls 2021 G01_01
Applied Data Science and AI/Machine Learning For Cybersecurity 2021 G02_01
Professionals
Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain 2020 F02_02
Defenses
Purple Team Tactics - Adversary Emulation for Breach Prevention & 2021 G01_02
Detection
Advanced Exploit Development for Penetration Tester 2021 F02_01
Automating Information Security With Python 2021 G01_01
Advanced Endpoint Investigations w/ alissa torres 2022
Cyberchef for Security Analysts 2022
Enterprise Attacker Emulation and C2 Implant Development w/ Joff 2022
Thyer
Red Team: Getting Access w/ Michael Allen 2022
Security Onion 2 Complete - 1,2 and 3 course
Network Forensics and Incident Response 2022
Network Forensics - Hunting with Packets 2022
ICS Visibility, Detection, and Response 2020 D02_06
Defending the Enterprise 2022
Advanced Windows Security Course 2020
1 day to maintain stealth communication 2020
Cyber Threat Intelligence 2021 G01_02
Training Program For CISSP 2020 E01_01
Mobile Device Security and Ethical Hacking 2020 E02_01
Advanced Penetration Testing, Exploit Writing and Ethical Hacking 2020 E03_01

Advanced Web Application Penetration Testing and Ethical Hacking 2020 E01_01

Securing Linux/Unix 2020 E01_01


Web Application Penetration Testing and Ethical Hacking 2020 E01_02
Cloud Security Architecture and Operation 2020 F01_01
Red Team Exercises and Adversary Emulation 2020 F01_01
Bug Bounties & Responsible Disclosure 2020 F02_03
Advanced Memory Forensics and Threat Detection
Security Strategic Planning, Policy, and Leadership
Building Intrusion Detection Honeypots 2021
Cloud Penetration Testing 2020
Open-Source Intelligence (OSINT) Gathering and Analysis 2020 E02_02
Securing Windows and PowerShell Automation 2020 F01_02
Detection Engineering with Sigma 2021
Threat reconnaissance using remotescoutware online training 2021
Osquery for Security Analysis 2020
Building Virtual Labs 2020
Hunt APTs with Yara like a GReAT Ninja 2021
Monnappa-LEARNING_MALWARE_ANALYSIS 2018
Red Team Ops 2020
Linux Forensics w/ Hal Pomeranz 2022
Applied Purple Team 2020
Windows Post Exploitation w/ Kyle Avery 2022
LAB VOD MP3 VLIVE REMARK

You might also like