This section includes industry courses and course materials originally prepared for students at various colleges and universities. Most lectures are available in PowerPoint files (older ones are PPT and newer are PPTX); some other documents such as syllabuses are usually available as PDF files. All students, teachers and others are welcome to use these course materials for free courses and lectures. If you want to use this material in paid courses contact me by email mekabay@gmail.com for permission to do so. Course codes have been converted to current standards wherever possible; however, older syllabuses and course descriptions may still contain older course labels. Community Courses: Safety Online (PDF), Disinformation (PDF PPTX), Using E-mail Effectively (PDF PPTX). Industry Courses: Welcome to My Web Site: overview of sections PPT (narrated) PDF (no narration), Assessing and Auditing Internet Usage Policies PPT PDF, Bugs, Flaws and Features PDF, Basic Medical INFOSEC PPTX, COMPUTER CRIME REVIEW 2000 HTML PDF, INFOSEC UPDATE PDF -- March 2001, INFOSEC UPDATE PDF -- March 2002, INFOSEC UPDATE PDF.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
A repository providing centralized access to presentation slides from major cybersecurity conferences including Black Hat, Offensivecon, and REcon events.
A comprehensive reference guide covering Nessus vulnerability scanner configuration, management, API usage, and best practices.
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.
A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.