FedVTE | | Advanced Computer Forensics |
EC-Council | | Advanced Network Defense |
FedVTE | | Advanced Network Flow Analysis |
FedVTE | | Advanced PCAP Analysis and Signature Development (APA) |
EC-Council | | Advanced Penetration Testing |
FedVTE | | Advanced Windows Scripting |
Arsenal Recon |  | AIM Online Training |
FedVTE | | Analysis of a Cyber Incident |
myosint | | Analyzing Domains and IP Addresses |
EC-Council | | Application Security Engineer - .NET |
EC-Council | | Application Security Engineer - JAVA |
FedVTE | | Artificial Intelligence (AI) and Machine Learning (ML) for Cyber |
SANS | | AUD507: Auditing & Monitoring Networks, Perimeters & Systems |
Basis Technology |  | Autopsy Basics and Hands On |
Magnet Forensics |  | AX100 Forensic Fundamentals Online Self Paced |
Magnet Forensics |  | AX200 Magnet AXIOM Examination Online Self Paced |
Magnet Forensics |  | AX250 Magnet AXIOM Advanced Computer Forensics Online Self Paced |
Belkasoft |  | Belkasoft Mobile Device Investigations Course |
FedVTE | | CDM 210 – CDM Enabled Threat Hunting (CETH) Course |
EC-Council | | CEH (Master) Practical |
EC-Council | | Certifed Cloud Security Engineer (C | CSE) |
EC-Council | | Certified Chief Security Officer |
EC-Council | | Certified Cybersecurity Technician |
EC-Council | | Certified Ethical Hacker (CEH) |
FedVTE | | Certified Ethical Hacker Version 10 (CEHv10) Prep |
EC-Council | | Certified Ethical Hacking |
Mile2 | | Certified Ethical Hacking (CEHv11) |
Mile2 | | Certified Ethical Hacking + Certification Exam Bundle |
Mile2 | | Certified Incident Handling Engineer (CIHE) |
EC-Council | | Certified Network Defender |
EC-Council | | Certified Penetration Testing Professional |
EC-Council | | Certified SOC Analyst (CSA) |
EC-Council | | Certified Threat Intelligence Analyst |
Mile2 | | Certified Virtualization Forensics Examiner (C)VFE) |
Mile2 | | CFR) CyberSec First Responder: Threat Detection and Response (Exam CFR-210) (CFR) |
Mile2 | | CompTIA Cybersecurity Analyst (CompTIA CYSA+) |
Mile2 | | CompTIA CySA+ Cybersecurity Analyst (CS0-002) + Certification Exam Bundle |
EC-Council | | Computer Hacking Forensic Investigator (CHFI) |
FedVTE | | Creating a Computer Security Incident Response Team (CSIRT) |
myosint | | Creating an OSINT Investigation Platform |
myosint | | Creating and Using Sock Puppets |
FedVTE | | Cryptocurrency for Law Enforcement |
FedVTE | | Cyber Awareness Challenge 2019 |
FedVTE | | Cyber Dark Arts |
FedVTE | | Cyber Fundamentals for Law Enforcement Investigations |
FedVTE | | Cyber Security Investigations |
FedVTE | | Cyber Supply Chain Risk Management |
FedVTE | | CyberEssentials |
FedVTE | | Cybersecurity Analyst |
FedVTE | | Cybersecurity for Technical Staff |
FedVTE | | CyberStat Workshops |
FedVTE | | CyberStat Workshops |
ADF Solutions |  | Digital Evidence Investigator |
ADF Solutions |  | Digital Evidence Investigator Certified Operator Training |
ADF Solutions |  | Digital Evidence Investigator Pro Certified Training |
FedVTE | | Don't Wake Up to a Ransomware Attack |
FedVTE | | Emerging Cyber Security Threats |
EC-Council | | Encryption Specialist |
FedVTE | | Enterprise Cybersecurity Operations |
EC-Council | | Ethical Hacking Essentials |
myosint | | Facebook - How to find interesting information |
myosint | | Facebook - How to search with an account |
myosint | | Facebook - Private Profiles |
myosint | | Facebook - Sowsearch |
SANS | | FOR308: Digital Forensics Essentials |
SANS | | FOR498: Battlefield Forensics & Data Acquisition |
SANS | | FOR500: Windows Forensic Analysis |
SANS | | FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics |
SANS | | FOR509: Enterprise Cloud Forensics and Incident Response |
SANS | | FOR518: Mac and iOS Forensic Analysis and Incident Response |
SANS | | FOR528: Ransomware for Incident Responders |
SANS | | FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response |
SANS | | FOR578: Cyber Threat Intelligence |
SANS | | FOR585: Smartphone Forensic Analysis In-Depth |
SANS | | FOR608: Enterprise-Class Incident Response & Threat Hunting |
SANS | | FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques |
SANS | | FOR710: Reverse-Engineering Malware: Advanced Code Analysis |
EC-Council | | Forensic Investigator |
FedVTE | | Foundations of Cybersecurity for Managers |
FedVTE | | Foundations of Incident Management |
FedVTE | | Fundamentals of Cyber Risk Management |
SANS | | ICS410: ICS/SCADA Security Essentials |
SANS | | ICS456: Essentials for NERC Critical Infrastructure Protection |
SANS | | ICS515: ICS Visibility, Detection, and Response |
myosint | | Image Analysis for OSINT |
EC-Council | | Incident Handler |
FedVTE | | Incident Response 101 |
FedVTE | | Insider Threat Analysis |
Basis Technology |  | Intro to DFIR: The Divide & Conquer process |
FedVTE | | Introduction to Computer Forensics |
FedVTE | | Introduction to Data Packet Analysis |
FedVTE | | Introduction to Investigation of Digital Assets |
myosint | | Introduction to Social Media |
FedVTE | | Introduction to Threat Hunting Teams |
FedVTE | | Introduction to Windows Scripting |
SANS | | LEG523: Law of Data Security and Investigations |
EC-Council | | Licensed Penetration Tester |
Magnet Forensics |  | Magnet AXIOM to Magnet AXIOM CYBER Transition |
Magnet Forensics |  | Magnet Certified Cloud Examiner |
Magnet Forensics |  | Magnet Certified Forensics Examiner - AXIOM |
Magnet Forensics |  | Magnet Certified Forensics Examiner Recertification - AXIOM |
Magnet Forensics |  | Magnet Certified macOS Examiner |
Magnet Forensics |  | Magnet Certified Video Examiner |
FedVTE | | Managing Computer Security Incident Response Teams (CSIRTs) |
SANS | | MGT414: SANS Training Program for the CISSP Certification |
SANS | | MGT415: A Practical Introduction to Cyber Security Risk Management |
SANS | | MGT512: Security Leadership Essentials for Managers |
SANS | | MGT514: Security Strategic Planning, Policy, and Leadership |
SANS | | MGT516: Managing Security Vulnerabilities: Enterprise and Cloud |
SANS | | MGT520: Leading Cloud Security Design and Implementation |
SANS | | MGT521: Leading Cybersecurity Change: Building a Security-Based Culture |
SANS | | MGT525: Managing Cybersecurity Initiatives and Effective Communication |
SANS | | MGT551: Building and Leading Security Operations Centers |
SANS | | MGT553: Cyber Incident Management |
ADF Solutions |  | Mobile Device Investigator |
EC-Council | | Mobile Ethical Hacking |
FedVTE | | Mobile Forensics |
EC-Council | | Network Defense Essentials |
MSAB | | ODT-XYW Certification |
FedVTE | | Offensive and Defensive Network Operations |
myosint | | OSINT Documentation with Obsidian |
FedVTE | | Overview of Creating and Managing Computer Security Incident Response Teams (CSIRTs) |
myosint | | People Searching |
myosint | | Physical Addresses and Phone Number Searches |
FedVTE | | Pure Data for Traffic Analysts |
EC-Council | | Python for Pentesters |
myosint | | Reverse Image Searching |
FedVTE | | Root Cause Analysis |
SANS | | SEC301: Introduction to Cyber Security |
SANS | | SEC388: Introduction to Cloud Computing and Security |
SANS | | SEC401: Security Essentials - Network, Endpoint, and Cloud |
SANS | | SEC402: Cybersecurity Writing: Hack the Reader |
SANS | | SEC403: Secrets to Successful Cybersecurity Presentation |
SANS | | SEC405: Business Finance Essentials |
SANS | | SEC440: CIS Critical Controls: A Practical Introduction |
SANS | | SEC450: Blue Team Fundamentals: Security Operations and Analysis |
SANS | | SEC460: Enterprise and Cloud | Threat and Vulnerability Assessment |
SANS | | SEC474: Building A Healthcare Security & Compliance Program |
SANS | | SEC488: Cloud Security Essentials |
SANS | | SEC497: Practical Open-Source Intelligence (OSINT) |
SANS | | SEC501: Advanced Security Essentials - Enterprise Defender |
SANS | | SEC503: Network Monitoring and Threat Detection In-Depth |
SANS | | SEC504: Hacker Tools, Techniques, and Incident Handling |
SANS | | SEC505: Securing Windows and PowerShell Automation |
SANS | | SEC510: Public Cloud Security: AWS, Azure, and GCP |
SANS | | SEC511: Continuous Monitoring and Security Operations |
SANS | | SEC522: Application Security: Securing Web Apps, APIs, and Microservices |
SANS | | SEC530: Defensible Security Architecture and Engineering: Implementing Zero Trust for the Hybrid Enterprise |
SANS | | SEC540: Cloud Security and DevSecOps Automation |
SANS | | SEC541: Cloud Security Attacker Techniques, Monitoring, and Threat Detection |
SANS | | SEC542: Web App Penetration Testing and Ethical Hacking |
SANS | | SEC555: SIEM with Tactical Analytics |
SANS | | SEC556: IoT Penetration Testing |
SANS | | SEC560: Enterprise Penetration Testing |
SANS | | SEC566: Implementing and Auditing Security Frameworks and Controls |
SANS | | SEC573: Automating Information Security with Python |
SANS | | SEC575: Mobile Device Security and Ethical Hacking |
SANS | | SEC586: Blue Team Operations: Defensive PowerShell |
SANS | | SEC587: Advanced Open-Source Intelligence (OSINT) Gathering and Analysis |
SANS | | SEC588: Cloud Penetration Testing |
SANS | | SEC595: Applied Data Science and Machine Learning for Cybersecurity Professionals |
SANS | | SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses |
SANS | | SEC617: Wireless Penetration Testing and Ethical Hacking |
SANS | | SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking |
SANS | | SEC661: ARM Exploit Development |
SANS | | SEC699: Purple Team Tactics - Adversary Emulation for Breach Prevention & Detection |
SANS | | SEC760: Advanced Exploit Development for Penetration Testers |
EC-Council | | Security Specialist |
FedVTE | | Sensors 101 for Traffic Analysts |
FedVTE | | SiLK Traffic Analysis |
FedVTE | | SQL for Traffic Analysts |
FedVTE | | Survival SiLK Series |
FedVTE | | TCP/IP Fundamentals for Network Traffic Analysts |
myosint | | Telegram Analysis |
myosint | | Tool: CyberChef |
myosint | | Tool: DNSRecon |
myosint | | Tool: Holehe |
myosint | | Tool: Sherlock |
myosint | | Tool: Spiderfoot |
ADF Solutions |  | Triage-G2 |
ADF Solutions |  | Triage-G2 PRO Certified Training |
ADF Solutions |  | Triage-Investigator Certified Training |
ADF Solutions |  | Triage-Investigator PRO |
FedVTE | | Understanding DNS Attacks |
myosint | | Username Searching |
myosint | | Using Breach Data in OSINT Investigations |
myosint | | Using Commandline OSINT Tools Introduction |
myosint | | Using File Metadata |
myosint | | Using OSINT in Threat Assessment and Critical Incident Management |
myosint | | Using Search Engines Effectively |
EC-Council | | Web App Penetration Testing |
EC-Council | | Web Application Hacking and Security |
myosint | | Wireless Networks and OSINT |
EC-Council | | Wireless Pentesting |
MSAB | | XAMN Horizon Certification |
MSAB | | XAMN Spotlight Certification |
MSAB | | XRY Express Logical Certification |
MSAB | | XRY Express Physical Certification |
MSAB | | XRY Recertification |
MSAB | | XRY Refresher |
DFIR Training |  | X-Ways Forensics Practitioner's Guide |