starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Curriculum
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
    ×
      Entry Certificate in Business Analysis (ECBA) Exam PrepEntry Certificate in Business Analysis (ECBA) Exam Prep
      Igor ArkhipovIgor Arkhipov
      Business | core | 15 hrs1.5K98.3130This course prepares learners for the IIBA® Entry Certificate in Business Analysis™ (ECBA™), enhancing skills, employability, and career growth for aspiring business analysts en...COURSE DETAILS
      Threat Hunting Techniques Threat Hunting Techniques
      Archan ChoudhuryArchan Choudhury
      Cybersecurity | intermediate | 9 hrsLearn to hunt cyber threats using machine learning and real-world tools like Splunk and Jupyter Notebooks. This course covers log analysis, anomaly detection, and behavior-based...COURSE DETAILS
      Digital Forensics EssentialsDigital Forensics Essentials
      Gilbert GeorgeGilbert George
      Cybersecurity | intermediate | 9 hrsLearn the fundamentals of digital forensics, how to collect, analyse, & report digital evidence using tools like FTK Imager and Autopsy. Gain hands-on skills in data recovery, c...COURSE DETAILS
      Securing Cloud OperationsSecuring Cloud Operations
      Luca BertonLuca Berton
      Cybersecurity | intermediate | 10 hrsLearn hands-on cloud security for AWS, Azure, and GCP. Configure IAM, firewalls, and encryption; enable GuardDuty and Defender; and map controls to CIS, ISO, and NIST frameworks...COURSE DETAILS
      Incident Response FrameworksIncident Response Frameworks
      Brett MoffettBrett Moffett
      Cybersecurity | intermediate | 9 hrsLearn to plan, implement, and manage cybersecurity incident response using NIST, SANS, and ISO frameworks. Build a customized, testable response plan to detect, contain, and rec...COURSE DETAILS
      Basics of Cyber Threat IntelligenceBasics of Cyber Threat Intelligence
      Tom ThemelesTom Themeles
      Cybersecurity | intermediate | 8 hrsLearn the fundamentals of Cyber Threat Intelligence (CTI), including its lifecycle, key tools, and practical applications for proactive defense against evolving cyber threats. I...COURSE DETAILS
      Cyber Espionage and CounterintelligenceCyber Espionage and Counterintelligence
      Hanniel JafaruHanniel Jafaru
      Cybersecurity | intermediate | 9 hrsLearn how cyber espionage operations work and how to counter them. Analyze APT tactics, detect data exfiltration, design counter-intelligence strategies, and deploy deception to...COURSE DETAILS
      Application Security Testing and DebuggingApplication Security Testing and Debugging
      Sonali Sen BaidyaSonali Sen Baidya
      Cybersecurity | intermediate | 9 hrsApplication Security Testing and Debugging involves finding software vulnerabilities through testing and fixing issues to ensure secure, functional code, protecting against pote...COURSE DETAILS
      Cybersecurity Governance: Integrate NIST and ISO Standards in 16 StepsCybersecurity Governance: Integrate NIST and ISO Standards in 16 Steps
      Pawel MielniczekPawel Mielniczek
      Cybersecurity | intermediate | 9 hrs1k98.8%0Master a 16-step blueprint to integrate ISO 27001/27002/27701 with the NIST Cybersecurity Framework. Build an audit-ready, risk-driven governance program with cloud, privacy, an...COURSE DETAILS
      Advanced Strategic Threat Intelligence Research & ReportingAdvanced Strategic Threat Intelligence Research & Reporting
      Monica McIntireMonica McIntire
      Cybersecurity | intermediate | 9 hrs0Gain advanced threat intelligence skills, collect, analyze, and report cyber threats using tools like Shodan, VirusTotal, and Maltego. Turn data into actionable insights to defe...COURSE DETAILS
      Offensive Cyber OperationsOffensive Cyber Operations
      Gleb MarchenkoGleb Marchenko
      Cybersecurity | intermediate | 8 hrs 20 mins1K96.9%129In this course, you’ll learn to think like an adversary to enhance your cybersecurity skills by exploring attacker methods, attack surfaces, and exploitation techniques while ma...COURSE DETAILS
      Leadership in Cybersecurity OversightLeadership in Cybersecurity Oversight
      Mark PetersMark Peters
      Cybersecurity | advanced | 9 hrs 10 mins1K97.8%131In this course, you’ll learn to lead cybersecurity with clarity and strategy—building actionable plans, communicating effectively with stakeholders, and fostering a security-fir...COURSE DETAILS
      Previous1...8910...51Next