Ready to embark on a knowledge quest? Explore our Courses section for a journey through the realm of product documentation!
“With so many courses out there, it’s hard for people to know where to start and where they can get the most bang for their buck. Learn about our products and services portfolio and discover how we protect.Broaden your security knowledge to strengthen your cyber resiliency and mitigate risks!”
Ossim AlienVault
This course will use AlienVault OSSIM to showcase a Security Information and Event Management (SIEM) system. A SIEM is used to aggregate logs for all sources in a network, analyze the logs through a correlation engine, and generating alarms on malicious indicators and activity.
CheckPoint Firewall
A leading global provider of cybersecurity solutions, Check Point protects customers from 5th generation cyber attacks, including malware, ransomware and more. Its multi-level security architecture offers advanced threat prevention to better defend your cloud, network and mobile devices.
Advent of Cyber 2023
Cybersecurity history is interesting indeed. It is thought to have started in 1971 when Bob Thomas, a computer programmer with BBN, created and deployed a virus that served as a security test.
Home Hacking Lab
VirtualBox is a powerful, open-source virtualization software that allows you to run multiple operating systems on a single machine. It supports a wide range of guest operating systems including Windows, Linux, and macOS.
VulnHub CTF Walkthrough OSCP
This vulnerable is a Beginner/Intermediate boot2root machine. There are four flags to find and two intended ways of getting root. But I am showcasing one way to get to root I encourage you to find the other way!