starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
    ×
      Mastering Project Management: From Basics to ExecutionMastering Project Management: From Basics to Execution
      John Sumanth VemuriJohn Sumanth Vemuri
      Business | intermediate | 15 hrsLearn project management from basics to execution, covering planning, organizing, and leading projects for successful outcomes.COURSE DETAILS
      Financial Analyst AcademyFinancial Analyst Academy
      Manish GuptaManish Gupta
      Finance | intermediate | 15 hrsThe Financial Analyst Academy is a four-course program that covers financial analysis, modeling, and data storytelling. It includes financial statements, valuation techniques, f...COURSE DETAILS
      Automating Cybersecurity Operations with AIAutomating Cybersecurity Operations with AI
      Rafiq WayaniRafiq Wayani
      Cybersecurity | core | 9 hrsLearn to automate cybersecurity tasks with AI using no-code tools like ChatGPT, Google Colab, and Splunk Free. Streamline threat detection, incident response, and SOC workflows ...COURSE DETAILS
      Accounting and Financial Modelling BootcampAccounting and Financial Modelling Bootcamp
      Michael McDonaldMichael McDonald
      Finance | core | 15 hrsThe Accounting & Financial Modeling Bootcamp is an online program for beginners, covering financial statements, Excel modeling, ratio analysis, and DCF valuation. Perfect for as...COURSE DETAILS
      Threat Hunting Techniques Threat Hunting Techniques
      Archan ChoudhuryArchan Choudhury
      Cybersecurity | intermediate | 9 hrsLearn to hunt cyber threats using machine learning and real-world tools like Splunk and Jupyter Notebooks. This course covers log analysis, anomaly detection, and behavior-based...COURSE DETAILS
      Digital Forensics EssentialsDigital Forensics Essentials
      Gilbert GeorgeGilbert George
      Cybersecurity | intermediate | 9 hrsLearn the fundamentals of digital forensics, how to collect, analyse, & report digital evidence using tools like FTK Imager and Autopsy. Gain hands-on skills in data recovery, c...COURSE DETAILS
      Instructional Design FoundationsInstructional Design Foundations
      Paul SiegelPaul Siegel
      UI/UX | core | 9 hrsThis course teaches foundational instructional design skills using the ADDIE model, covering needs analysis, design, content development, and evaluation, preparing learners for ...COURSE DETAILS
      Securing Cloud OperationsSecuring Cloud Operations
      Luca BertonLuca Berton
      Cybersecurity | intermediate | 9 hrsLearn hands-on cloud security for AWS, Azure, and GCP. Configure IAM, firewalls, and encryption; enable GuardDuty and Defender; and map controls to CIS, ISO, and NIST frameworks...COURSE DETAILS
      Incident Response FrameworksIncident Response Frameworks
      Brett MoffettBrett Moffett
      Cybersecurity | intermediate | 9 hrsLearn to plan, implement, and manage cybersecurity incident response using NIST, SANS, and ISO frameworks. Build a customized, testable response plan to detect, contain, and rec...COURSE DETAILS
      Basics of Cyber Threat IntelligenceBasics of Cyber Threat Intelligence
      Tom ThemelesTom Themeles
      Cybersecurity | intermediate | 9 hrsLearn the fundamentals of Cyber Threat Intelligence (CTI), including its lifecycle, key tools, and practical applications for proactive defense against evolving cyber threats. I...COURSE DETAILS
      Cyber Espionage and CounterintelligenceCyber Espionage and Counterintelligence
      Hanniel JafaruHanniel Jafaru
      Cybersecurity | intermediate | 9 hrsLearn how cyber espionage operations work and how to counter them. Analyze APT tactics, detect data exfiltration, design counter-intelligence strategies, and deploy deception to...COURSE DETAILS
      Application Security Testing and DebuggingApplication Security Testing and Debugging
      Sonali Sen BaidyaSonali Sen Baidya
      Cybersecurity | intermediate | 9 hrsApplication Security Testing and Debugging involves finding software vulnerabilities through testing and fixing issues to ensure secure, functional code, protecting against pote...COURSE DETAILS
      12...43Next