Curriculum
- 2 Sections
- 30 Lessons
- 365 Days
Expand all sectionsCollapse all sections
- Certified Cybercop Blue Team - Defensive Security24
- 1.1Package Management and Repositories38 Minutes
- 1.2Incident Response Toolkit/Process31 Minutes
- 1.3Policies to Mitigate Risk19 Minutes
- 1.4Software Development Lifecycle (SDLC)34 Minutes
- 1.5Security Information Event Management28 Minutes
- 1.6Blue Team Introduction33 Minutes
- 1.7Blue Team Methodology44 Minutes
- 1.8Cryptography and PKI30 Minutes
- 1.9Digital Forensics35 Minutes
- 1.10Kali Linux Bash Scripting27 Minutes
- 1.11Mobile Device Hacking 167 Minutes
- 1.12Mobile Device Hacking 29 Minutes
- 1.13Recruiting Blue Team Members20 Minutes
- 1.14Threat and Vulnerability Management36 Minutes
- 1.15Vulnerability Scanning Part-116 Minutes
- 1.16Vulnerability Scanning Part-226 Minutes
- 1.17Sifting through services.83 Minutes
- 1.18Security Orchestration, Automation, and Response (SOAR)40 Minutes
- 1.19Linux Firewalls39 Minutes
- 1.20Setting Localization Options20 Minutes
- 1.21Introduction to Linux52 Minutes
- 1.22Software and Systems Security65 Minutes
- 1.23ChatGPT17 Minutes
- 1.24Blue Team Case Study45 Minutes
- Certified Cybercop Blue Team - Defensive Security - LABS6
Tools in Kali Linux
Prev