Cyber Judo Training Content & Videos

Training Content & Videos:

Cybersecurity Training - Career Tips - Resume Writing & Interviewing
Security Engineer Skill Tree & Certification Recommendations
Pre-engagement Penetration Testing Considerations
Writing A Pentesting Report
Red Team Mindset
Reverse Engineering an ISP Router
Leveraging Open Source Intelligence (OSINT) Tools & Techniques
Advanced NMAP Techniques
Advanced NMAP Techniques
Introduction to Purple Teaming Fundamentals
Introduction to GRC
Tools of The Trade: Legion
Tools of The Trade: Legion
Introductory Guide About Ransomware
Cyber Threat Intelligence (CTI): Hunting And Analyzing Advanced Cyber Threats
Building a Home Cybersecurity Lab
Getting Started with Mobile SAST
Getting Started with IOT Security (Part 1)
Getting Started with Azure & Microsoft365 Security (Part 1)
Getting Started with Azure & Microsoft365 Security (Part 2)
The History and Current State of Cyber Legislation Within the United States of America

Fun Footer Stuff:

Copyright 2023 Cyber Judo. All of our work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Simply put, please share it, provide attribution and if you remix it then share generously with others. The work of others that is featured on this site is always provided with attribution and is not directly monetized.



The opinions expressed here are respectively our own and do not reflect the views of our organization or anyone else unless quoted verbatim.

We try our best to provide helpful insight to folks but there is no warranty to completeness of anything we create or post here; so please be sure to always do your own research.