• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

  1. protectaccount

    IT & Software CISO Competency – Technology | Cybrary

    Course Description Role of Technical Knowledge for CISOs Dealing with IT and Network Teams The Challenge of Developers Case Study on IT for the CISO Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have...
  2. protectaccount

    IT & Software CISO Competency – Threats | Cybrary

    Course Description Role of Threat for the CISO Quantitative versus Qualitative Risks Dealing with Dark Web Information Case Study on Threat Insights Guest Speaker: Chris Hodson Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. protectaccount

    IT & Software Risk Management and Information Systems Control | Cybrary

    What is Subnetting? A component of network fundamentals, Subnetting allows an organization to divide the physical network into several logical networks. Why do I need this certification? A solid understanding of subnetting is vital for managing your networks and the overall Security...
  4. protectaccount

    IT & Software Penetration Testing Execution Standard (PTES) | Cybrary

    Course Description There are a lot of tools and training videos out there, some providing great value to your education and betterment as a Security Professional. If I were to ask you today, what steps does your team take to perform a penetration test or what standard do you follow, what is...
  5. protectaccount

    IT & Software AWS Infrastructure Security | Cybrary

    Looking to learn more about the security infrastructure offerings with AWS? You’re in luck! AWS offers a multitude of tools that secure your network and systems and in this course, we will introduce you to them. Link: *** Hidden text: You do not have sufficient rights to view the hidden text...
  6. protectaccount

    IT & Software Malware Threats | Cybrary

    Course Description This basic malware course is a good starting point for students interested in both penetration testing and malware analysis. Students studying for industry certification exams, like CEH, may find the course beneficial. Course Goals By the end of this course, students should...
  7. protectaccount

    IT & Software Create a Subnet | Cybrary

    What is Subnetting? A component of network fundamentals, Subnetting allows an organization to divide the physical network into several logical networks. Why do I need this certification? A solid understanding of subnetting is vital for managing your networks and the overall Security...
  8. protectaccount

    IT & Software Sniffing | Cybrary

    In this course, we focus our attention on two common tools for sniffing for penetration testing: Wireshark and TCPDump. The course is intended to be primarily hands-on, so you will need access to either the Cybrary lab environment or you will need to build out your own virtual systems for...
  9. protectaccount

    IT & Software CompTIA A+ 220-1002 | Cybrary

    CompTIA A Plus Training Goals By the end of the course, students should be able to: Identify types and characteristics of PC, laptop, and mobile components, including motherboard, CPU, memory, and storage, input, and output devices. Install, configure, and troubleshoot peripheral devices...
  10. protectaccount

    IT & Software Application of the MITRE ATT&CK Framework | Cybrary

    In this course we will move through the 12 areas of the MITRE Attack Framework and discuss how security professionals should use the matrix to assist them in overlaying solutions or controls to address current threats. The MITRE Attack Framework is a globally accessible knowledge base of...
  11. protectaccount

    IT & Software Handling BitLocker and FileVault 2: Evimetry and Mount Image Pro | Cybrary

    During the course we will collect a FileVault 2 encrypted MacBook Air in minutes without breaking a sweat using Evimetry. Once we have a series of fully encrypted forensic images will use GetData Mount Image Pro to decrypt our forensic images and make the data available for further forensic...
  12. protectaccount

    IT & Software ICS/SCADA Fundamentals | Cybrary

    Course Description Students will learn about basic ICS protocols and SCADA systems. Students will then be introduced to the threats and risks that are associated with ICS systems. This course will also teach students how ICS technology differs from the traditional enterprise networking...
  13. protectaccount

    IT & Software Privileged Access Management Fundamentals | Cybrary

    Course Description This course will also explore some of the benefits of privileged access management and best practices. The course will then discuss privileged access management in the context of Active Directory (AD) and perform hands-on labs. Prerequisites Students should have 1-2 years...
  14. protectaccount

    IT & Software CMMC Overview | Cybrary

    The Cybersecurity Maturity Model Certification (CMMC) combines various cybersecurity standards and best practices, and maps these controls and processes across different maturity levels from basic level cyber hygiene to advanced level. The goal is that for a given CMMC level, the controls and...
  15. protectaccount

    IT & Software End User Email Security | Cybrary

    This course is designed with avid email end-users in mind, and serves as the ideal starting point for anyone looking to enter the cyber security field and ultimately raise their threat awareness. What will I learn? How to recognize malicious emails, the biggest dangers when using email and email...
  16. protectaccount

    IT & Software Certified in the Governance of Enterprise IT (CGEIT) | Cybrary

    Course Description CGEIT is a certification that many companies consider a prerequisite for working with enterprise IT governance. This course is for professionals in the industry working to manage enterprise IT programs and portfolios. Prerequisites Certification requires one (1) year of...
  17. protectaccount

    IT & Software Session Hijacking | Cybrary

    Course Description We will cover basic information about session hijacking in Module 1. Since this is a skill-based course, we will then move into performing hands-on labs in Module 2. You will also learn how to set up and configure your own virtual environment for performing the example lab...
  18. protectaccount

    IT & Software CIS Top 20 Critical Security Controls | Cybrary

    These security controls can be combined with frameworks, like NIST SP 800-37 (The NIST Risk Management Framework-RMF) to provide organizations with defense-in-depth best practices. This course may help prepare students for industry certifications around the CIS Security Controls.The course...
  19. protectaccount

    IT & Software Building a Modern Insider Threat Program | Cybrary

    Insider Threat is a big topic these days and companies need to build Insider Threat programs to contend with the risk, either intentional or accidental, that comes from the inside. In this course, we’ll look at what insiders are doing that puts data at risk, the changes in the digital...
  20. protectaccount

    IT & Software Mobile App Security | Cybrary

    A storm of mobile app security and privacy issues continues to intensify, while the skills gap worsens. Security professionals have discovered that web app security practices don’t cut it for mobile. Because the tools and methodologies differ, it’s time for practitioners to learn some new skills...
  21. protectaccount

    IT & Software Cyber Network Security | Cybrary

    Course Description The course will cover fundamental knowledge of the incident response process and business continuity planning. Students will also learn about malware, common attack vectors, and learn to use Windows firewall. Prerequisites This course is designed for beginners who have...
  22. protectaccount

    IT & Software Courses Check Point Jump Start: Maestro Hyperscale Network Security | Cybrary

    Check Point Maestro introduces to the industry a new way to utilize current hardware investment and maximize appliance capacity in an easy-to-manage Hyperscale network security solution. With Maestro, organizations can simplify their workflow orchestration and scale up their existing Check...
  23. protectaccount

    IT & Software End User Cyber Fundamentals | Cybrary

    This course is designed for users looking for an understanding of how to navigate the internet securely. You will learn about Social Media, Public Cloud Storage and IoT, what they are, what the risks are and how to use your security and privacy settings on these platforms to better protect...
  24. protectaccount

    IT & Software Revenue Protection as a CISO | Cybrary

    Security is often referred to as a “Cost” Center. However, security can be a Revenue Protector and a Competitive differentiator that can build trust from prospects, which will close deals. Prerequisites 5-7 years of Information Technology Experience 3-5 years of Project Management Experience...
Top Bottom