| Cyber security for employees in the context of NIS2 and KSC | publish | Security |
| Technical aspects of NIS2/KSC implementation | publish | Security |
| NIS2/KSC for executives: legal liability, risk management and cyber security strategy | publish | Security |
| Advanced z/OS Security: Crypto, Network, RACF, and Your Enterprise | publish | Security |
| z/VM RACF and DirMaint Implementation | publish | Security |
| z/OS Security Server RACF, Implementing and Customization | publish | Security |
| Basics of z/OS RACF Administration. | publish | Security |
| IBM Security QRadar SIEM Advanced Topics. | publish | Security |
| GDPR - Certified Information Privacy Professional and Manager prep course. | publish | Security |
| IBM Security QRadar SIEM Administration. | publish | Security |
| Exploiting the Advanced Features of RACF | publish | Security |
| Security Intelligence Fundamentals | publish | Security |
| Effective RACF Administration | publish | Security |
| IMS Security | publish | Security |
| Cybersecurity Roles, Processes & Operating System Security | publish | Security |
| Advanced cryptographic techniques in information systems | publish | Security |
| Reverse engineering and code security techniques | publish | Security |
| Innovative blockchain applications in business: from theory to practice | publish | Security |
| Cyber security training in public administration | publish | Security |
| Safety by design | publish | Security |
| How to implement an Information Security Management System? | publish | Security |
| Implementation of PKI and TLS security | publish | Security |
| Security in the cloud | publish | Security |
| Cyber security awareness for executives | publish | Security |
| Cyber security incident response team (CERT) | publish | Security |
| Certified systems security practitioner | publish | Security |
| PCI-DSS Practitioner | publish | Security |
| The basics of cyber resilience | publish | Security |
| Data protection practitioner | publish | Security |
| Advanced digital investigation techniques | publish | Security |
| The basics of the SOC analyst's job | publish | Security |
| Fundamentals of governance, risk and compliance (GRC) | publish | Security |
| Ethical hacker - techniques and tools | publish | Security |
| Refresher program for compliance officers and MLROs | publish | Security |
| Social engineering in cyber security | publish | Security |
| Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CTF) | publish | Security |
| MITRE ATT&CK - a framework of tactics and attack techniques. | publish | Security |
| Cyber security and business process management | publish | Security |
| Capture the Flag (CTF) - a practical exercise in cyber security | publish | Security |
| Understanding and managing the malware threat | publish | Security |
| Modeling effective cybersecurity processes | publish | Security |
| Managing cyber security risks in the supply chain | publish | Security |
| Secure programming in C/C++ | publish | Security |
| Introduction to cryptography | publish | Security |
| Modeling processes related to RODO | publish | Security |
| Modern application security | publish | Security |
| CDP - Data Protection Certificate | publish | Security |
| CompTIA Security+ (SY0-601) - exam preparation | publish | Security |
| Cloud security seminar | publish | Security |
| Introduction to digital investigations | publish | Security |
| Operational security in the cloud | publish | Security |
| Fundamentals of biometrics in forensics | publish | Security |
| Fundamentals of automotive cyber security | publish | Security |
| Security and forensic analysis of mobile devices | publish | Security |
| Communications and crisis management planning in cyberspace | publish | Security |
| Cybercrime in business | publish | Security |
| Business continuity practitioner | publish | Security |
| End-user security: Protecting the digital footprint | publish | Security |
| Standard Java security features | publish | Security |
| NIS2 - Technical and administrative requirements | publish | Security |
| Cyber security and RODO - technical and process requirements | publish | Security |
| Compatibility with HiTrust Common Security Framework | publish | Security |
| CISA - Certified Information Systems Auditor - exam preparation | publish | Security |
| DevSecOps - security in the DevOps cycle | publish | Security |
| Identity and access management (IAM) | publish | Security |
| Fundamentals of information systems security | publish | Security |
| Snyk - securing applications and infrastructure | publish | Security |
| Digital identity in telecommunications | publish | Security |
| ISO 27001:2017 Data Protection Officer. | publish | Security |
| Analysis and risk management of open data | publish | Security |
| Introduction to ISO 27001 - the basics of the standard | publish | Security |
| Dark Web - the hidden web | publish | Security |
| SC-200T00: Microsoft Security Operations Analyst | publish | Security |
| Network penetration tests | publish | Security |
| Building information security in accordance with ISO 27005 | publish | Security |
| CISSP - Certified Information Systems Security Professional | publish | Security |
| The basics of corporate cyberwarfare | publish | Security |
| Web application security | publish | Security |
| Cloudflare - CDN, security and protection against DDoS | publish | Security |
| Overview of the Common Body of Knowledge for CISSP | publish | Security |
| Cyber Security Body of Knowledge (CyBOK). | publish | Security |
| IBM Qradar SIEM: from basics to advanced techniques | publish | Security |
| Fundamentals of cyber security - a practical course | publish | Security |
| Public key infrastructure (PKI) - implementation and management | publish | Security |
| Embedded systems security for testers | publish | Security |
| Ethical hacking and countermeasures | publish | Security |
| CISA - Certified Information Systems Auditor | publish | Security |
| Security analyst - comprehensive course | publish | Security |
| CRISC - Certified IT Risk Management Specialist | publish | Security |
| Interactive Application Security Testing (IAST) | publish | Security |
| WEBAP - Web Application Security | publish | Security |
| Securing Windows with PowerShell automation | publish | Security |
| Security of embedded systems | publish | Security |
| CHFI - Certified Computer Forensics Expert | publish | Security |
| PKI: Implementation and management | publish | Security |
| Advanced Java, JEE and web application security | publish | Security |
| Kali Linux - advanced penetration testing | publish | Security |
| Kali Linux - penetration testing intermediate level | publish | Security |
| Node.JS and web application security | publish | Security |
| Advanced Java Security | publish | Security |
| Azure cloud security | publish | Security |
| Secure Java programming (with OWASP) | publish | Security |
| Apache Shiro: Securing Java Applications | publish | Security |
| Certified Kubernetes Security Specialist (CKS) - preparation for certification | publish | Security |
| Cyber security in practice for beginners | publish | Security |
| Investigative analysis of web and mobile applications | publish | Security |
| IT security for practitioners | publish | Security |
| Penetration testing of 5G networks - a professional approach | publish | Security |
| WiFi network security - threats and protection | publish | Security |
| OpenVAS - open source vulnerability scanning | publish | Security |
| Securing network services - best practices | publish | Security |
| Penetration testing using Nmap | publish | Security |
| Penetration testing - detecting and exploiting vulnerabilities | publish | Security |
| Java and web application security | publish | Security |
| Security in OpenStack - protecting cloud infrastructure | publish | Security |
| Introduction to Open Source Cyber Intelligence | publish | Security |
| OWASP - comprehensive security testing of web applications | publish | Security |
| Identity and access management with Okta | publish | Security |
| Secure .NET programming | publish | Security |
| Compliance and compliance risk management | publish | Security |
| OWASP - mobile application security testing | publish | Security |
| Identity and Access Management with OpenAM | publish | Security |
| OWASP Top 10 key application security threats | publish | Security |
| CISMP - Certificate in Information Security Management | publish | Security |
| Advanced PHP and secure coding | publish | Security |
| CipherTrust Manager - data security management | publish | Security |
| Secure programming in PHP | publish | Security |
| Cyber security using Python | publish | Security |
| Securing email with ProtonMail | publish | Security |
| Security-Enhanced Linux (SELinux) - advanced security. | publish | Security |
| CRS: Financial reporting and automatic information exchange | publish | Security |
| Understanding IPSec VPN - secure network communications | publish | Security |
| BeyondCorp - Zero Trust security implementation | publish | Security |
| Security of wireless and telecommunications networks | publish | Security |
| HashiCorp Vault - managing secrets | publish | Security |
| Network security administrator - advanced course | publish | Security |
| Advanced security for C#, ASP.NET and web applications | publish | Security |
| Systems and network security | publish | Security |
| C# and .NET application security | publish | Security |
| Network security on Linux systems | publish | Security |
| Security of .NET, C# and ASP.NET development | publish | Security |
| Nessus Manager - advanced vulnerability scanning | publish | Security |
| Open Authentication (OAuth) - implementation of secure authentication | publish | Security |
| Microsoft SDL Core - the basics of a secure development cycle | publish | Security |
| Security policy management | publish | Security |
| Server room security and maintenance - best practices | publish | Security |
| DevOps Security - creating a security strategy in DevOps | publish | Security |
| Security management - strategies and practices | publish | Security |
| Cyber security basics | publish | Security |
| Panorama of secure coding - trends and best practices | publish | Security |
| Application security for developers - from basics to advanced techniques | publish | Security |
| Android application security - protection against threats | publish | Security |
| Application security in C/C++, ASP.NET and web applications | publish | Security |
| Advanced software security - beyond ethical hacking | publish | Security |
| Network and communication security - an advanced approach | publish | Security |
| Secure development and testing of web applications | publish | Security |
| Cloud application security - strategies and implementation | publish | Security |
| Web application security - best practices | publish | Security |
| How to write secure code - practical techniques | publish | Security |
| Personal Data Protection in Practice - RODO | publish | Security |
| Security in Apache Kafka | publish | Security |
| Protection of Sensitive and Business Data for Board Members and TOP Managers | publish | Security |
| Security in the AWS cloud | publish | Security |
| Security testing - methodologies and tools | publish | Security |
| API security - protection and access control | publish | Security |
| Expert issues on cybersecurity | publish | Security |
| Cyber security for users | publish | Security |
| Zscaler - security in the cloud | publish | Security |
| Security in Python - best practices | publish | Security |
| Network security (penetration testing) | publish | Security |
| Safety of office workers | publish | Security |
| IT security - for non-technical employees | publish | Security |
| Penetration testing using Python and Kali Linux | publish | Security |
| ISO 26262 - automotive functional safety | publish | Security |
| ISO 26262 Part 6: Secure software development | publish | Security |
| RODO (GDPR) and business process management (BPM). | publish | Security |
| JWT - Secure Authentication | publish | Security |
| Data Protection Officer | publish | Security |
| Best practices in security testing | publish | Security |
| Identification and escalation of security incidents of the ICT environment | publish | Security |
| Hazard modeling and risk analysis based on STRIDE and qualitative risk analysis | publish | Security |
| Ubuntu security - best practices and tools | publish | Security |
| Computer network security | publish | Security |
| GDPR - Certified Information Privacy Professional/Europe (CIPP/EU). | publish | Security |
| Cyber security for TSU executives | publish | Security |
| Cyber security for employees of Local Government Units (LGUs) | publish | Security |
| Cyber threats and methods of defense | publish | Security |
| Web application security | publish | Security |
| Internal Auditor of the Information Security Management System. | publish | Security |
| Information Security Management System Auditor | publish | Security |
| Investigative audit | publish | Security |
| Audit and control - alternative sources for obtaining information | publish | Security |
| IT security incident analysis | publish | Security |
| GDPR - Certified Information Privacy Manager | publish | Security |
| Elements of RODO and information security in human resource management | publish | Security |
| Data protection | publish | Security |
| Information security | publish | Security |
| Security of embedded systems (embedded) | publish | Security |
| Cyber security basics for Municipality employees | publish | Security |
| Management and neutralization of DDoS attacks | publish | Security |
| Information analysis | publish | Security |
| Risk management in information security | publish | Security |
| Practical about RODO - data protection reform in healthcare | publish | Security |
| Business continuity management | publish | Security |
| Information Security Policy | publish | Security |
| Introduction to IT security issues | publish | Security |
| Personal data protection under the RODO | publish | Security |
| Impact of RODO on the activities of the local government unit | publish | Security |
| How to secure mobile apps | publish | Security |
| Practical about RODO/GDPR - EU data protection reform | publish | Security |
| Cyber security awareness training | publish | Security |
| Implementation and management of Public Key Infrastructure (PKI). | publish | Security |
| Advanced applications of SSL/TLS protocols in secure communications | publish | Security |
| FinOps: cost management and financial optimization in the cloud | publish | Security |
| Data Governance and Data Quality Management | publish | Security |
| Security and compliance in the Google Cloud ecosystem | publish | Security |
| Security Operations on AWS | publish | Security |
| IBM Security zSecure RACF Management Workshop | publish | Security |
| Advanced pentesting techniques in OT environments | publish | Security |
| IBM Security zSecure RACF and SMF Auditing | publish | Security |
| Advanced socio-technical threats and building a culture of cyber-resilience | publish | Security |
| IBM Security zSecure Admin Basic Administration and Reporting | publish | Security |
| Machine Identity Management: the key to security in the era of automation and the cloud | publish | Security |
| Implementing RACF Security for CICS/ESA and CICS/TS | publish | Security |
| Cybersecurity Mesh Architecture (CSMA): designing and implementing integrated security | publish | Security |
| DORA regulation: ensuring digital operational resilience in the financial sector and for ICT providers | publish | Security |
| The NIS2 directive in practice: preparing your organization | publish | Security |
| ISO 28000 Lead Implementer (ISO 28000 Lead Implementer) | publish | Security |
| Lead Digital Forensics Examiner. | publish | Security |
| Lead Application Security Manager. | publish | Security |
| Lead Penetration Testing Manager. | publish | Security |
| ISO/IEC 27001 Lead Implementer (ISO/IEC 27001 Lead Implementer) | publish | Security |
| NIS 2 Directive Lead Implementer. | publish | Security |
| DORA Lead Implementer (DORA Lead Implementer). | publish | Security |
| ISO/IEC 27001 Lead Auditor (ISO/IEC 27001 Lead Auditor). | publish | Security |
| Certified Data Protection Officer (CDPO). | publish | Security |
| ISO/IEC 27701 Lead Implementer (ISO/IEC 27701 Lead Implementer). | publish | Security |
| Lead Cloud Security Manager. | publish | Security |
| Lead Cybersecurity Manager. | publish | Security |
| ISO/IEC 27005 Lead Information Security Risk Manager (ISO/IEC 27005 Lead Risk Manager). | publish | Security |
| ISO 21502 Lead Project Manager (ISO 21502 Lead Project Manager). | publish | Security |
| ISO/IEC 27002 Lead Manager (ISO/IEC 27002 Lead Manager) | publish | Security |