M. E. Kabay Courses Logo

M. E. Kabay Courses

0
Free
2
10 September 2025
Visit Website

This section includes industry courses and course materials originally prepared for students at various colleges and universities. Most lectures are available in PowerPoint files (older ones are PPT and newer are PPTX); some other documents such as syllabuses are usually available as PDF files. All students, teachers and others are welcome to use these course materials for free courses and lectures. If you want to use this material in paid courses contact me by email mekabay@gmail.com for permission to do so. Course codes have been converted to current standards wherever possible; however, older syllabuses and course descriptions may still contain older course labels. Community Courses: Safety Online (PDF), Disinformation (PDF PPTX), Using E-mail Effectively (PDF PPTX). Industry Courses: Welcome to My Web Site: overview of sections PPT (narrated) PDF (no narration), Assessing and Auditing Internet Usage Policies PPT PDF, Bugs, Flaws and Features PDF, Basic Medical INFOSEC PPTX, COMPUTER CRIME REVIEW 2000 HTML PDF, INFOSEC UPDATE PDF -- March 2001, INFOSEC UPDATE PDF -- March 2002, INFOSEC UPDATE PDF.

FEATURES

SIMILAR TOOLS

A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.

A repository providing centralized access to presentation slides from major cybersecurity conferences including Black Hat, Offensivecon, and REcon events.

A comprehensive reference guide covering Nessus vulnerability scanner configuration, management, API usage, and best practices.

Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.

Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.

A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.

A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.

A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.

A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.

PINNED

RoboShadow Logo

A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.

Vulnerability Management
Proton Pass Logo

Proton Pass is a cross-platform password manager that provides encrypted storage, password generation, and security monitoring features with integrated 2FA and dark web monitoring capabilities.

Data Protection
NordVPN Logo

NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.

Network Security
Mandos Logo

Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Consulting
CybersecTools logoCybersecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved