SEC

SEC 401 - Security Essentialschevron-rightSEC 450 - Blue Team Fundamentalschevron-rightSEC 502 - Perimeter Protection In-Depthchevron-rightSEC 503 - Network Monitoring and Threat Detection In-Depthchevron-rightSEC 504 - Hackers Tools, Techniques And Incident Handlingchevron-rightSEC 505 - Securing Windows and PowerShell Automationchevron-rightSEC 506 - Securing Linux & UNIXchevron-rightSANS 509 - Securing Oracle Databasechevron-rightSEC 511 - Continuous Monitoring and Security Operationschevron-rightSEC 517 - Cutting Edge Hacking Techniqueschevron-rightSEC 524 - Cloud Security Fundamentalschevron-rightSEC 531 - Windows Command Line Kung Fuchevron-rightSEC 542 - Web App Penetration Testingchevron-rightSEC 560 - Enterprise Penetration Testingchevron-rightSEC 565 - Red Team Operations and Adversary Emulationchevron-rightSEC 566 - Implementing and Auditing Security Frameworkschevron-rightSEC 573 - Automating Information Security with Pythonchevron-rightSEC 575: Mobile Device Securitychevron-rightSEC 580 - Metasploit for Enterprise Penetration Testingchevron-rightSEC 587 - Advanced Open Source Intelligencechevron-rightSEC 599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenseschevron-rightSEC 617 - Wireless Penetration Testing and Ethical Hackingchevron-rightSEC 642 - Advanced Web App Penetration Testingchevron-rightSEC 660 - Advanced Penetration Testingchevron-rightSEC 760 - Advanced Exploit Developmentchevron-rightSEC 554: Blockchain and Smart Contract Securitychevron-right

Last updated