Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Samer Adi, IT Security Leader - CISO, Green Shield Canada; Chris Schweigert, Senior Director of Cybersecurity Operations, TrueBlue Inc.; and Hadas Cassorla, CISO, M1 Finance
Learn DevOps concepts and principles. Become a DevOps Professional. Prepare for the EXIN DevOps Professional certification exam.
Prepare for the EXIN DevOps Professional certification. Learn DevOps concepts, principles, and practice with sample exams.
In this series, Daniel and Justin take a look at some of the more advanced scripting practices. Here they will empower your scripts by taking advantage of things like Functions, Libraries, creating graphical elements, sed (Stream EDitor), gawk, and Regular Expression.
Becoming a Linux Power User is a technical skills course designed to elevate viewers to "Power User" status.
The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.
Master container security in our Vulnerable Erlang course! Exploit CVE-2025-32433, deploy vulnerable Docker containers, detect threats with Sysdig Falco, and secure systems. Ideal for security professionals, DevSecOps, and pentesters.
The Linux Fundamentals for Certification learning path provides essential Linux operating system skills and prepares you for entry-level Linux certification exams. You'll master core command-line operations and fundamental system administration concepts.
Learn about types of vulnerabilities, the exploits that can occur from those vulnerabilities, and the programming practices that will help prevent exploitation in an application!
In this series, we are going to take a look at programming using the Python programming language. If you have tried to start before and just spun your wheels, then you should give it a try again.
James Kettle of PortSwigger reveals sophisticated web race condition exploits, demonstrating how attackers can manipulate state machines and create backdoors through precise timing attacks.
Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.
Sean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.
Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.
Learn from Christophe Barel about securing supply chains, adopting shift-left strategies, and managing open-source risks. Explore frameworks for secure coding, automated security-by-design, and faster detection and remediation of supply chain attacks.
Aurélien Svevi explains how application detection and response cuts through security noise by analyzing applications in production to connect attacks with exploitable vulnerabilities.
Sean Mack shares how DevSecOps transforms security from obstacle to competitive advantage by embedding protection into development workflows, enabling teams to move faster while reducing risk through proper road maps and guardrails.