• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

IT & Software All Learning Path from InfoSec 2020 + PDFs + Files Part 3 (1 Viewer)

Currently reading:
 IT & Software All Learning Path from InfoSec 2020 + PDFs + Files Part 3 (1 Viewer)

Covers web development, programming, AI, cloud computing, DevOps, and cybersecurity.
Recently searched:

protectaccount

Member
Amateur
LV
3
Joined
Nov 21, 2025
Threads
839
Likes
66
Awards
8
Credits
16,798©
Cash
0$
8eGAEnF.png


All Learning Path from InfoSec 2020 + PDFs + Files + screenshots of cyber ranges – PART 3
In part 3:

==========

IACRB Certified Reverse Engineering Analyst (CREA)
IACRB Certified SCADA Security Architect (CSSA)
IACRB CREA Fundamentals
IACRB Cyber Threat Hunting Fundamentals
IACRB Mobile Web Application Penetration Testing
ICS_SCADA Security Analyst
ICS_SCADA Security Fundamentals
Incident Response
Information Privacy Fundamentals
Information Security Auditing
Information Security Fundamentals
Introduction to Applied Cryptography and Cryptanalysis
Introduction to SDLC
Introduction to Vulnerability Management
Introduction to x86 Disassembly
ISACA Certified Information Security Manager (CISM)
ISACA Certified in Risk and Information Systems Control (CRISC)
ISACA CISA
ISACA CISA Fundamentals
ISACA CISM Fundamentals
ISACA CRISC Fundamentals
(ISC)² CAP Fundamentals
(ISC)² CCSP Fundamentals
(ISC)² Certified Authorization Professional (CAP)
(ISC)² Certified Cloud Security Professional (CCSP)
(ISC)² Certified Information Systems Security Professional (CISSP)
(ISC)² CISSP Fundamentals
(ISC)² CISSP-ISSAP
(ISC)² CISSP-ISSAP Fundamentals
(ISC)² CISSP-ISSEP
(ISC)² CISSP-ISSEP Fundamentals
(ISC)² CISSP-ISSMP
(ISC)² CISSP-ISSMP Fundamentals
(ISC)² CSSLP Fundamentals
ITIL 4 Foundation
ITIL Fundamentals
JNCIA-Junos
Linux Fundamentals




Machine Learning for Red Team Hackers
Malware Analysis & Reverse Engineering
Microsoft Windows and Virtualization Fundamentals
Mobile Application Pentesting
Mobile Forensics
Mobile Forensics Fundamentals
Network Forensics

Link:
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom