
DevSecOps SAST(/w GitLab)
taesun1114
$38.50
Basic / sast, CI/CD, gitlab, SonarQube
4.8
(8)
What is DevSecOps? Configure a CI build environment and an environment that automatically performs SAST checks during build
Basic
sast, CI/CD, gitlab

DevSecOps SAST(/w GitLab)
taesun1114
$38.50
Basic / sast, CI/CD, gitlab, SonarQube
4.8
(8)
What is DevSecOps? Configure a CI build environment and an environment that automatically performs SAST checks during build
Basic
sast, CI/CD, gitlab

DevSecOps SAST(/w GitLab)
taesun1114
$38.50
Basic / sast, CI/CD, gitlab, SonarQube
4.8
(8)

DevSecOps Basic (/w SAST)
taesun1114
$51.70
Beginner / CI/CD, sast, SonarQube, Jenkins, grafana, Prometheus
4.7
(7)
What is DevSecOps? Configure a CI build environment and an environment that automatically performs SAST checks during build
Beginner
CI/CD, sast, SonarQube

DevSecOps Basic (/w SAST)
taesun1114
$51.70
Beginner / CI/CD, sast, SonarQube, Jenkins, grafana, Prometheus
4.7
(7)

CAN Communication - Everything Automotive Newcomers Need to Know
zombiemania
$59.40
Beginner / CAN, uds
4.9
(201)
This is not an 'academic' lecture on CAN communication, but thinking of explaining to new employees 'who you'll work with', I've included everything needed in the process of working.
Beginner
CAN, uds

CAN Communication - Everything Automotive Newcomers Need to Know
zombiemania
$59.40
Beginner / CAN, uds
4.9
(201)
The Roadmap to Becoming a White Hacker That No One Told You About: A to Z
knockOn
$17.60
Beginner / System Hacking, Offensive Security
4.8
(23)
Everything you need to know to become an offensive white hacker. From the path to becoming an elite hacker to conquering the information security market, all the tips are compressed into one lecture!
Beginner
System Hacking, Offensive Security
The Roadmap to Becoming a White Hacker That No One Told You About: A to Z
knockOn
$17.60
Beginner / System Hacking, Offensive Security
4.8
(23)

Automotive SW - Mastering UDS Diagnostic Communication
zombiemania
$40.70
Basic / Embedded, Network, uds, CAN
4.9
(97)
You'll gain a very clear understanding of what diagnostic communication is in automotive SW roles, and what a diagnostic communication practitioner does and how! This lecture provides content specific enough for practitioners to immediately start work with actual spec documents.
Basic
Embedded, Network, uds

Automotive SW - Mastering UDS Diagnostic Communication
zombiemania
$40.70
Basic / Embedded, Network, uds, CAN
4.9
(97)

C programming that is deeply reminiscent
nullnull8537
$84.70
Intermediate / C, kernel, secure-coding
5.0
(83)
This course covers topics for those who have completed basic studies of the C language, such as compiler theory, stack frame structure, multi-threading, virtual memory structure, security vulnerabilities, and secure coding. It is highly recommended for those who wish to become experts in the C/C++ field, or those who majored in CS or have similar skills!
Intermediate
C, kernel, secure-coding

C programming that is deeply reminiscent
nullnull8537
$84.70
Intermediate / C, kernel, secure-coding
5.0
(83)

Employee Security Training - Cyber Hacking Threats and Security Activities, Strengthening Personal Information Protection
boanproject
$26.40
Beginner / security training
4.8
(136)
Cyber security threats are increasing every year, stealing personal information and abusing privacy. This course covers security issues and security activities that employees must know and follow in their work and personal lives.
Beginner
security training

Employee Security Training - Cyber Hacking Threats and Security Activities, Strengthening Personal Information Protection
boanproject
$26.40
Beginner / security training
4.8
(136)

Cisco Networking Academy: Internet of Things Fundamentals
asckorea
$26.40
Beginner / IoT, Network, Big Data, Python, Embedded
4.8
(32)
This course will help you understand the value of IoT and how it changes our lives and society. You will learn the basics of IoT device programming, IoT device connection technology, big data analysis, and automation. You will understand digital transformation and its impact on businesses and society.
Beginner
IoT, Network, Big Data

Cisco Networking Academy: Internet of Things Fundamentals
asckorea
$26.40
Beginner / IoT, Network, Big Data, Python, Embedded
4.8
(32)

Privacy Protection Training (How to avoid being fooled by social engineering)
boanproject
$8.80
Beginner / security training
4.9
(40)
This lecture is designed to make personal information protection education interesting and ‘social engineering-based.’ Rather than covering the revisions to the Personal Information Protection Act, it focuses on real-life information protection threat cases and responses.
Beginner
security training

Privacy Protection Training (How to avoid being fooled by social engineering)
boanproject
$8.80
Beginner / security training
4.9
(40)

Introduction to Windows Malware Analysis
boanproject
$110.00
Beginner / Malware, security training, Penetration Testing, Engineer information security
4.6
(101)
This is an introductory malware analysis course that even beginners can easily understand. Based on methodologies such as static analysis, dynamic analysis, and automated analysis of malware analysis, you will analyze various sample cases. It also covers in detail how to use various tools necessary for malware analysis.
Beginner
Malware, security training, Penetration Testing

Introduction to Windows Malware Analysis
boanproject
$110.00
Beginner / Malware, security training, Penetration Testing, Engineer information security
4.6
(101)
Hacking Mobile Games (Unity)
taesun1114
$26.40
Basic / Frida, Cheat Engine, Android
4.4
(5)
In order to create a game, you create it using a commercially available "game engine". Among them, we have created an analysis process for the [Unity game engine], which is the most used in mobile games, and we have created a game cracking process that you can learn through practice by analyzing the game flow through a sample game.
Basic
Frida, Cheat Engine, Android
Hacking Mobile Games (Unity)
taesun1114
$26.40
Basic / Frida, Cheat Engine, Android
4.4
(5)

Network Step 3 (Creating a Network) Anyone Can Start
penterester
$26.40
Basic / Network
4.5
(26)
For those who know network theory but have difficulty actually building one, we will teach you the basic methods for building and configuring a network.
Basic
Network

Network Step 3 (Creating a Network) Anyone Can Start
penterester
$26.40
Basic / Network
4.5
(26)

MS Document/Email Security - AIP (Azure Information Protection)
omas
$26.40
Basic / Azure, MS-Office
4.9
(7)
Learn about Microsoft Azure Information Protection (AIP), which allows you to control and protect important data, documents, and emails within your company, and to enhance data protection from classification and permissions to wherever it is stored and with whomever it is shared.
Basic
Azure, MS-Office

MS Document/Email Security - AIP (Azure Information Protection)
omas
$26.40
Basic / Azure, MS-Office
4.9
(7)
Genie's Information Security System Practice (Beginner)
geni
$68.20
4 Days Only
6%
$63.80
Beginner / security, firewall, network-security, cloud-computing, security training
4.8
(6)
This course carefully selects the core systems that beginners must know in the vast field of information security. Instead of rigid theory, it's structured to help you intuitively understand system principles through clear analogies and practical examples. With this single course, you can grasp the big picture of information security systems as a whole and develop practical skills.
Beginner
security, firewall, network-security
Genie's Information Security System Practice (Beginner)
geni
$68.20
4 Days Only
6%
$63.80
Beginner / security, firewall, network-security, cloud-computing, security training
4.8
(6)
![[Introduction Class] Server, Internet and DataCourse Thumbnail](https://cdn.inflearn.com/public/courses/328897/cover/0803d412-5041-472f-be5c-ef5e3b9b00b2/328897-eng.png?w=420)
[Introduction Class] Server, Internet and Data
breachers
Free
Beginner / Network, Digital Literacy
4.9
(92)
How do the sites we access every day work? Before we start studying data in earnest, let's take some time to learn about servers and the Internet, which are the background knowledge of IT.
Beginner
Network, Digital Literacy
![[Introduction Class] Server, Internet and DataCourse Thumbnail](https://cdn.inflearn.com/public/courses/328897/cover/0803d412-5041-472f-be5c-ef5e3b9b00b2/328897-eng.png?w=420)
[Introduction Class] Server, Internet and Data
breachers
Free
Beginner / Network, Digital Literacy
4.9
(92)
Web Vulnerability Diagnosis (Major Information and Communication Infrastructure) That Even Beginners Can Do
penterester
$39.60
Basic / xss, sql-injection
4.2
(39)
This is a web vulnerability diagnosis lecture based on the major telecommunications infrastructure web vulnerability guide. Use this lecture to diagnose web vulnerabilities.
Basic
xss, sql-injection
Web Vulnerability Diagnosis (Major Information and Communication Infrastructure) That Even Beginners Can Do
penterester
$39.60
Basic / xss, sql-injection
4.2
(39)

Networking Step 2 (Subnetting) that anyone can start
penterester
$17.60
Basic / Network
4.0
(48)
This is a lecture on subnetting, which is necessary when creating or reading network configuration diagrams.
Basic
Network

Networking Step 2 (Subnetting) that anyone can start
penterester
$17.60
Basic / Network
4.0
(48)
The process of obtaining the Information Security Risk Manager (ISRM) certification.
ISMS-P WIN
$254.10
Beginner / ISMS-P, CPPG, Engineer information security, security training
5.0
(3)
KCA Information Security Risk Manager (ISRM) certification course! The cornerstone for acquiring the top 3 personal information protection certifications: CPPG, ISMS-P!
Beginner
ISMS-P, CPPG, Engineer information security
The process of obtaining the Information Security Risk Manager (ISRM) certification.
ISMS-P WIN
$254.10
Beginner / ISMS-P, CPPG, Engineer information security, security training
5.0
(3)
Ethereum Core Architecture Masterclass – Based on the Latest Revised Edition of Mastering Ethereum
coincraft
$110.00
8 Days Only Early Bird
50%
$55.00
Basic / Ethereum, Solidity, Blockchain, Cryptography, Smart Contract
For those who have only seen Ethereum's structure in fragments, we'll organize everything from wallets, transactions, smart contracts, to the EVM into one cohesive flow. You can follow along even without a technical background.
Basic
Ethereum, Solidity, Blockchain
Ethereum Core Architecture Masterclass – Based on the Latest Revised Edition of Mastering Ethereum
coincraft
$110.00
8 Days Only Early Bird
50%
$55.00
Basic / Ethereum, Solidity, Blockchain, Cryptography, Smart Contract
APP Penetration Testing Project Practice Course (Portfolio)
jueygrace
$26.40
Early Bird
29%
$18.70
Intermediate / ISMS-P, CPPG, Engineer information security, security training, Industrial Security Exper
This is a project where you install an actual app on your phone and practice penetration testing using hacking tools in accordance with the Electronic Financial Infrastructure Inspection Standards and Public Service Inspection Standards for mobile apps. This course helps you understand mobile app penetration testing, overcome any fears, and learn inspection know-how, result report writing, and communication methods.
Intermediate
ISMS-P, CPPG, Engineer information security
APP Penetration Testing Project Practice Course (Portfolio)
jueygrace
$26.40
Early Bird
29%
$18.70
Intermediate / ISMS-P, CPPG, Engineer information security, security training, Industrial Security Exper
WEB Penetration Testing Project Practice Course (Portfolio)
jueygrace
$42.90
Early Bird
28%
$30.80
Intermediate / CPPG, ISMS-P, Engineer information security, security training, Industrial Security Exper
- Provision of penetration testing environment and assessment tools - WEB penetration testing practice according to the 2025 revised edition of Critical Information and Communications Infrastructure - WEB penetration testing practice according to the 2025 revised edition of Electronic Financial Infrastructure - Review and sharing of vulnerabilities existing on websites - Education on penetration testing report writing methods and improvement measures
Intermediate
CPPG, ISMS-P, Engineer information security
WEB Penetration Testing Project Practice Course (Portfolio)
jueygrace
$42.90
Early Bird
28%
$30.80
Intermediate / CPPG, ISMS-P, Engineer information security, security training, Industrial Security Exper
Information Security Continuous Assessment Inspection Standards and Best Practices Training
jueygrace
$42.90
Early Bird
28%
$30.80
Intermediate / ISMS-P, Engineer information security, security training, Industrial Security Exper, CPPG
-Learn about the information security continuous assessment items conducted annually for financial companies, and strengthen preparation and response capabilities as a financial security officer -Learn based on the highest-grade information security continuous assessment cases, and receive education on know-how to achieve and maintain the highest grade in information security continuous assessment
Intermediate
ISMS-P, Engineer information security, security training
Information Security Continuous Assessment Inspection Standards and Best Practices Training
jueygrace
$42.90
Early Bird
28%
$30.80
Intermediate / ISMS-P, Engineer information security, security training, Industrial Security Exper, CPPG
Personal Financial Fraud (Hacking) Prevention and Response Methods
jueygrace
$8.80
Early Bird
25%
$6.60
Intermediate / Penetration Testing, System Hacking, ISMS-P, CPPG, Engineer information security
Voice phishing, URL, mobile, accounts, card usage, internet banking, ARS authentication, and other various financial fraud incidents are causing an increase in victims. Recently, hacking and fraud techniques utilizing various vulnerabilities such as open banking, simple payment (pay), strengthened fraud methods, hackers utilizing leaked personal information, and taking control of personal PCs and mobile devices are being reinforced. Financial authorities and various financial companies do not specifically disclose accident procedures and hacking methods related to financial consumers, which has led to growing misunderstandings among people who have never experienced hacking. We have recognized the seriousness of this issue through reports from our surroundings and have produced educational materials. Please, we hope you will recognize accurate hacking methods, and also understand related laws and policies to appropriately establish preventive systems and strengthen response measures in advance. (In case of incidents, it is your own responsibility under current law.)
Intermediate
Penetration Testing, System Hacking, ISMS-P
Personal Financial Fraud (Hacking) Prevention and Response Methods
jueygrace
$8.80
Early Bird
25%
$6.60
Intermediate / Penetration Testing, System Hacking, ISMS-P, CPPG, Engineer information security
Major Information and Communication Infrastructure 2025 Version Network, Security Equipment, Control System Risk Assessment
jueygrace
$17.60
Intermediate / Penetration Testing, ISMS-P, CPPG, Engineer information security, security training
Risk assessment plans for network equipment, security equipment, and control systems based on the revised major information and communication infrastructure standards for the second half of 2025, and education for vulnerability elimination through the application of years of know-how and fast and accurate inspection and improvement measures In particular, expectations for efforts to secure inspection speed and improvement plans according to the designation of ISMS-P certification and ISO27001 certification scope Experience with network equipment, security equipment, and control systems that have relatively lower accessibility compared to servers, DB, WEB, WAS, PC, and Cloud (Public, Private), making environment setup difficult
Intermediate
Penetration Testing, ISMS-P, CPPG
Major Information and Communication Infrastructure 2025 Version Network, Security Equipment, Control System Risk Assessment
jueygrace
$17.60
Intermediate / Penetration Testing, ISMS-P, CPPG, Engineer information security, security training

Complete Conquest of Electronic Financial Supervisory Regulations: The Expert's Choice for Financial Security
zeroday
$26.40
Basic / Engineer information security, security training
4.9
(7)
The core content of the Electronic Financial Supervision Regulations has been well-organized and infused with practical experience. Understand complex regulations clearly and grow as a financial security expert. The main content of the Electronic Financial Supervision Regulations revised on February 5, 2025 is also included in the lecture. Please refer to it.
Basic
Engineer information security, security training

Complete Conquest of Electronic Financial Supervisory Regulations: The Expert's Choice for Financial Security
zeroday
$26.40
Basic / Engineer information security, security training
4.9
(7)

Easy-to-understand computer networks from someone with 20 years of experience
inokyuni
$102.30
Beginner / Network, router, switch, CCNA, networking
4.8
(78)
Learn the theory of computer networks. Study networks thoroughly by configuring your own network using a simulation program. We provide lecture materials with good explanations.
Beginner
Network, router, switch

Easy-to-understand computer networks from someone with 20 years of experience
inokyuni
$102.30
Beginner / Network, router, switch, CCNA, networking
4.8
(78)
(Personal Information/Information Security) Only the Essential Security Included! How to Protect Your Entire Company (2025 ver.)
skmns
$17.60
3 Days Only
25%
$13.20
Beginner / security training
4.7
(3)
This course covers the importance of information security and personal data protection, providing systematic learning from essential knowledge needed in practice to the latest security issues. Based on the practical experience and expertise of personal data protection specialist instructor Jo Ah-young, it provides realistic education with a sense of field experience.
Beginner
security training
(Personal Information/Information Security) Only the Essential Security Included! How to Protect Your Entire Company (2025 ver.)
skmns
$17.60
3 Days Only
25%
$13.20
Beginner / security training
4.7
(3)
IT Essential Knowledge - Properly Learning Introduction to Information and Communication (Part 2)
usefulit
$58.30
Beginner / Engineer Information Processing, Industrial Engineer Information Processing
5.0
(1)
This course is a foundational learning program that covers Introduction to Information and Communication Technology, one of the core theories in computer engineering. Through this course, learners can understand the basic structure and operating principles of computers, and learn the principles and applications of information and communication technology based on this foundation. It is structured to provide comprehensive learning from the processes of information generation, transmission, processing, and storage to data communication methods in network and internet environments. In addition, by understanding the basic concepts of information and communication technology along with the trends and roles of information and communication technology utilized in real life and industry as a whole, it provides a solid theoretical foundation for learners who are first entering the fields of computer engineering and information and communication technology. 👉 By taking this course, learners can build a fundamental foundation in information and communication technology that encompasses computers and networks, and furthermore, utilize it for advanced learning or preparation for related certifications.
Beginner
Engineer Information Processing, Industrial Engineer Information Processing
IT Essential Knowledge - Properly Learning Introduction to Information and Communication (Part 2)
usefulit
$58.30
Beginner / Engineer Information Processing, Industrial Engineer Information Processing
5.0
(1)
Network, Let's Understand Through Pictures and Animation (2025ver)
artprogrammer6403
$58.30
18%
$47.30
Beginner / Network, Protocol, Wireshark
4.9
(46)
Learn about networks easily, quickly, and engagingly with pictures and videos!
Beginner
Network, Protocol, Wireshark
Network, Let's Understand Through Pictures and Animation (2025ver)
artprogrammer6403
$58.30
18%
$47.30
Beginner / Network, Protocol, Wireshark
4.9
(46)
Critical Information Infrastructure 2025 Version Management, Physical Risk Assessment
jueygrace
$17.60
Intermediate / ISMS-P, Engineer information security, CPPG, Penetration Testing, security training
Develop a system to submit annual activity performance including establishment of information security regulations and preparation of various activity evidence by applying domestic and international certification standards related to information protection management systems and internal/external audit criteria for Risk assessment standards for management and physical sectors of major information and communication infrastructure facilities revised in the second half of 2025. Establish activity plans for enhancing information security levels compared to last year in response to external environmental changes (AI, etc.), internal environmental changes (new systems and employee changes including external staff), and prepare for legal amendments and new evaluation indicators. In particular, objectively and thoroughly inspect various activities to strengthen accident prevention systems such as personal information leakage due to hacking, establish plans for central (headquarters) management and supervision of all departments and safe management and supervision of service companies, operate DevSecOps systems following the establishment of AI systems, operate PbD adequacy review systems, etc. Based on performing expanded monitoring areas, regular inspection report areas, external disclosure areas, data integration system inspections (API, MyData, etc.), establishment of network separation improvement plans according to N2SF, advancement of Zero Trust application, etc. *Possessing over 150 references for establishing and applying world's first highest-level information security and personal information protection activity and system enhancement plans
Intermediate
ISMS-P, Engineer information security, CPPG
Critical Information Infrastructure 2025 Version Management, Physical Risk Assessment
jueygrace
$17.60
Intermediate / ISMS-P, Engineer information security, CPPG, Penetration Testing, security training
Personal Information Consignee Inspection Training
jueygrace
$19.80
Intermediate / security training
Training on Inspection Know-how for Data Privacy Officers, Operational Staff, and Entrusted Parties Subject to Consulting Providing Improvement Measures for Insufficient Oversight of Entrusted Parties and Detailed Explanations of Inspection Methods
Intermediate
security training
Personal Information Consignee Inspection Training
jueygrace
$19.80
Intermediate / security training
Genie's Information Security Job Master (Career Experience & Entry-level Package)
geni
$59.40
Beginner / Python, Penetration Testing, Self Improvement, security, career-advice
This is the most realistic and systematic job roadmap for beginners and novices in the information security field. Explore the 5 core job functions (planning, development, operations, assessment, monitoring) and learn how to become a strategic talent that companies seek first. End your vague concerns and design a clear career vision!
Beginner
Python, Penetration Testing, Self Improvement
Genie's Information Security Job Master (Career Experience & Entry-level Package)
geni
$59.40
Beginner / Python, Penetration Testing, Self Improvement, security, career-advice
Infrastructure Security Audit - Complete Solution with Ansible + Django
taesun1114
$33.00
Beginner / Python, Django, Ansible
5.0
(1)
This course is designed for practitioners who are just starting infrastructure security audits or are consuming significant resources on manual inspections. It's a hands-on process where we build a fully automated audit system together that automates inspection items based on Electronic Financial Supervisory Regulations, performs batch inspections of dozens to hundreds of servers through Ansible, and visualizes results using Django with filtering and Excel download capabilities.
Beginner
Python, Django, Ansible
Infrastructure Security Audit - Complete Solution with Ansible + Django
taesun1114
$33.00
Beginner / Python, Django, Ansible
5.0
(1)
From Hacking Basics to Intermediate Level, Learn System Hacking & Reversing All at Once
knockOn
Free
Basic / System Hacking, security training
4.8
(16)
Complete curriculum for beginners in hacking. From beginner to intermediate level, completed in one course.
Basic
System Hacking, security training
From Hacking Basics to Intermediate Level, Learn System Hacking & Reversing All at Once
knockOn
Free
Basic / System Hacking, security training
4.8
(16)
Penetration Testing Project Practice Course (Portfolio)
jueygrace
$17.60
Early Bird
25%
$13.20
Intermediate / ISMS-P, CPPG, security training, Engineer information security, Industrial Security Exper
Most large corporations and financial institutions are conducting penetration testing in addition to simulated hacking, so recently there is a need to establish new positions and secure capabilities to perform penetration operations using the RED TEAM terminology as is. Therefore, in addition to simple WEB and APP simulated hacking, we are opening an educational course that can provide practical training on large-scale personal information leakage after discovering scenarios that can penetrate servers. +Providing server and website environments where penetration testing can be performed +Sharing hacking tools and hacking methods
Intermediate
ISMS-P, CPPG, security training
Penetration Testing Project Practice Course (Portfolio)
jueygrace
$17.60
Early Bird
25%
$13.20
Intermediate / ISMS-P, CPPG, security training, Engineer information security, Industrial Security Exper
Electronic Financial Infrastructure and Key Information Communication Infrastructure 2025 Version and Latest DB, WAS, PC, Web, App Penetration Testing Risk Assessment
jueygrace
$17.60
Intermediate / Penetration Testing, Engineer information security, ISMS-P, security training, CPPG
Electronic Financial Infrastructure Vulnerability Analysis and Assessment based on 2025 standards, DBMS, WAS(PaaS), PC explained based on the Major Information and Communication Infrastructure standards revised in the second half of 2025 And penetration testing explained based on the standards revised in the second half of 2025 Additionally, mobile penetration testing as well Expected skill improvement through know-how transfer and fast and accurate inspection methods and remediation measures
Intermediate
Penetration Testing, Engineer information security, ISMS-P
Electronic Financial Infrastructure and Key Information Communication Infrastructure 2025 Version and Latest DB, WAS, PC, Web, App Penetration Testing Risk Assessment
jueygrace
$17.60
Intermediate / Penetration Testing, Engineer information security, ISMS-P, security training, CPPG
IT Essential Knowledge - Properly Learning Introduction to Information and Communication (Part 1)
usefulit
$61.60
Beginner / Engineer Information Processing, Industrial Engineer Information Processing, Engineer information security
5.0
(1)
This course is a foundational learning program that covers Introduction to Information and Communication Technology, one of the core theories in computer engineering. Through this course, learners can understand the basic structure and operating principles of computers, and learn the principles and applications of information and communication technology based on this foundation. The course is structured to provide comprehensive learning from the processes of information generation, transmission, processing, and storage to data communication methods in network and internet environments. In addition to the basic concepts of information and communication technology, by understanding the trends and roles of information and communication technology utilized in real life and across industries, this course provides a solid theoretical foundation for learners who are first entering the fields of computer engineering and information and communication technology. 👉 By taking this course, learners can build a fundamental foundation in information and communication technology that encompasses computers and networks, and further utilize it for advanced learning or preparation for related certifications.
Beginner
Engineer Information Processing, Industrial Engineer Information Processing, Engineer information security
IT Essential Knowledge - Properly Learning Introduction to Information and Communication (Part 1)
usefulit
$61.60
Beginner / Engineer Information Processing, Industrial Engineer Information Processing, Engineer information security
5.0
(1)
RTL - Red Team Taster
redraccoon
$228.80
Intermediate / Penetration Testing
5.0
(9)
RTL (Red Team Lite) is an introductory red team course that allows you to learn the concepts and technical elements required for full-chain red team penetration testing - attacker infrastructure setup, C2 advancement, payload creation, information gathering, initial penetration, foothold establishment, privilege escalation, lateral movement, follow-up attacks, and data exfiltration - through real attackers' TTPs.
Intermediate
Penetration Testing
RTL - Red Team Taster
redraccoon
$228.80
Intermediate / Penetration Testing
5.0
(9)
Breaking Down Secure Coding
arigaram
$77.00
Basic / security training, Penetration Testing, security
5.0
(8)
This lecture is designed for understanding even if you have no prior knowledge of what Secure Coding (Security Coding) is. After covering basic security coding concepts, it focuses on web service security. This was a special lecture presented under the auspices of OO University. It presents over 160 source codes with rich comments, pinpointing core topics and techniques immediately applicable in practice.
Basic
security training, Penetration Testing, security
Breaking Down Secure Coding
arigaram
$77.00
Basic / security training, Penetration Testing, security
5.0
(8)

Network Step 1 (Network Model) Anyone Can Start
penterester
$8.80
Beginner / Network
4.0
(87)
This is the first step of the network basics lecture that you can learn even if you don't know the basics of networks, "Network Model".
Beginner
Network

Network Step 1 (Network Model) Anyone Can Start
penterester
$8.80
Beginner / Network
4.0
(87)