INE – Actionable Information from Aggregated Log Data

INE – Actionable Information from Aggregated Log Data
English | Tutorial | Size: 3.22 GB


A centralized logging system is only one part of a complete logging infrastructure. In order to properly protect an IT infrastructure from malicious actors, useful information needs to be extracted from that log data.

INE – Email Security Management & Strategy

INE – Email Security Management & Strategy
English | Tutorial | Size: 2.41 GB


Email is one of the most common forms of electronic communication for businesses, but it is also one of the most abused by malicious threat actors.

INE – Web Application Penetration Testing Professional (eWPTv2)

INE – Web Application Penetration Testing Professional (eWPTv2)
English | Tutorial | Size: 20.07 GB


Interested in learning how to assess and mitigate real-world web application vulnerabilities an organization could potentially be exposed to?