fbpx
cybersecurity
education
€ EUR
  • $ USD
  • € EUR

CQURE Courses

  • Class

  • Skill Levels

  • Format

CyberBytes: Exploit Development Training
Learn how to use exploit development toolkit, in order to identify vulnerabilities in Windows applications.
CyberBytes: Advanced Attacks Against Active Directory
Join Security Expert Krystian Zieja and learn advanced attacks against Active Directory and how to detect and mitigate these threats.
CyberBytes: Deep Dive into Penetration Testing on Azure and Other Cloud Technologies
In just a little over two hours, you’ll learn advanced pentesting techniques through real-world case studies, demos, and examples.
CyberBytes: Malicious Software Execution Prevention
Learn the most successful way of preventing malware and an unknown or unwanted software from executing in a way that does not involve anti-virus or anti-malware software.
CyberBytes: PKI Well Revised: Common Mistakes Which Lead to Huge Compromise of Identity
Join Michał Jankowski-Lorek, Ph.D and learn how to rectify the 5 most dangerous mistakes compromising identity.
CyberBytes: Memory Dump Analysis
Learn how to perform digital forensics step by step, from memory collection to memory analysis, so you’ll have the skills to investigate advanced cyberattacks.
CyberBytes: Microsoft SQL Server Security
In just 2 hours, you’ll discover how to extract data from memory dumps and develop the advanced digital forensic skills you need to investigate stealthy cyberattacks.
CyberBytes: Exploit Development Training

Learn how to use exploit development toolkit, in order to identify vulnerabilities in Windows applications.

CyberBytes: Exploit Development Training

Learn how to use exploit development toolkit, in order to identify vulnerabilities in Windows applications.

CyberBytes: Advanced Attacks Against Active Directory

Join Security Expert Krystian Zieja and learn advanced attacks against Active Directory and how to detect and mitigate these threats.

CyberBytes: Advanced Attacks Against Active Directory

Join Security Expert Krystian Zieja and learn advanced attacks against Active Directory and how to detect and mitigate these threats.

CyberBytes: Deep Dive into Penetration Testing on Azure and Other Cloud Technologies

In just a little over two hours, you’ll learn advanced pentesting techniques through real-world case studies, demos, and examples.

CyberBytes: Deep Dive into Penetration Testing on Azure and Other Cloud Technologies

In just a little over two hours, you’ll learn advanced pentesting techniques through real-world case studies, demos, and examples.

CyberBytes: Malicious Software Execution Prevention

Learn the most successful way of preventing malware and an unknown or unwanted software from executing in a way that does not involve anti-virus or anti-malware software.

CyberBytes: Malicious Software Execution Prevention

Learn the most successful way of preventing malware and an unknown or unwanted software from executing in a way that does not involve anti-virus or anti-malware software.

CyberBytes: PKI Well Revised: Common Mistakes Which Lead to Huge Compromise of Identity

Join Michał Jankowski-Lorek, Ph.D and learn how to rectify the 5 most dangerous mistakes compromising identity.

CyberBytes: PKI Well Revised: Common Mistakes Which Lead to Huge Compromise of Identity

Join Michał Jankowski-Lorek, Ph.D and learn how to rectify the 5 most dangerous mistakes compromising identity.

CyberBytes: Memory Dump Analysis

Learn how to perform digital forensics step by step, from memory collection to memory analysis, so you’ll have the skills to investigate advanced cyberattacks.

CyberBytes: Memory Dump Analysis

Learn how to perform digital forensics step by step, from memory collection to memory analysis, so you’ll have the skills to investigate advanced cyberattacks.

CyberBytes: Microsoft SQL Server Security

In just 2 hours, you’ll discover how to extract data from memory dumps and develop the advanced digital forensic skills you need to investigate stealthy cyberattacks.

CyberBytes: Microsoft SQL Server Security

In just 2 hours, you’ll discover how to extract data from memory dumps and develop the advanced digital forensic skills you need to investigate stealthy cyberattacks.

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form