SEC
SEC 401 - Security EssentialsSEC 450 - Blue Team FundamentalsSEC 502 - Perimeter Protection In-DepthSEC 503 - Network Monitoring and Threat Detection In-DepthSEC 504 - Hackers Tools, Techniques And Incident HandlingSEC 505 - Securing Windows and PowerShell AutomationSEC 506 - Securing Linux & UNIXSANS 509 - Securing Oracle DatabaseSEC 511 - Continuous Monitoring and Security OperationsSEC 517 - Cutting Edge Hacking TechniquesSEC 524 - Cloud Security FundamentalsSEC 531 - Windows Command Line Kung FuSEC 542 - Web App Penetration TestingSEC 560 - Enterprise Penetration TestingSEC 565 - Red Team Operations and Adversary EmulationSEC 566 - Implementing and Auditing Security FrameworksSEC 573 - Automating Information Security with PythonSEC 575: Mobile Device SecuritySEC 580 - Metasploit for Enterprise Penetration TestingSEC 587 - Advanced Open Source IntelligenceSEC 599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain DefensesSEC 617 - Wireless Penetration Testing and Ethical HackingSEC 642 - Advanced Web App Penetration TestingSEC 660 - Advanced Penetration TestingSEC 760 - Advanced Exploit DevelopmentSEC 554: Blockchain and Smart Contract Security
Last updated