MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Latest Online IT & Technology Training Courses, Course Reviews, Paid & Free Technology Courses and MOOCs in Information Technology domain. Share your e-Learning experience with IT community and submit your Online IT Course Reviews today.

Technology Courses for Threat Modeling
    All IT Courses and Reviews can be editable through Desktop/Tablet.
  • The Super-Sized Ethical Hacking Bundle

    The Super-Sized Ethical Hacking Bundle

    Internet security has never been as important as it is today with more information than ever being handled digitally around the globe. In the first course of this four volume bundle, you'll get an introduction to hacking and how to protect yourself and others. You'll develop an understanding of the threat and vulnerability landscape through threat modeling and risk assessments, and build a foundation for which to expand your security knowledge. Access 117 lectures & 11 hours of content 24/7 Explore the Darknet, malware, exploit kits, phishing, zero day vulnerabilities, & more Learn about global tracking & hacking infrastructures that nation states run Understand the foundations of operating system security & privacy functionality Get a crash course on encryption, how it can be bypassed, & what you can do to mitigate risks Discover defenses against phishing, SMShing, vishing, identity theft, & other cons

  • Security Literacy

    Security Literacy

    The internet is an invaluable resource for information and entertainment, but it doesn’t always protect your privacy and identity. This course offers an overview on how to stay safe and secure when using your browser and beyond. We’ll introduce foundational concepts about how online activity translates to internet traffic. We’ll then explore some common ways that attackers can view and manipulate this traffic for their uses and how to protect against them. And finally, we’ll establish some industry-recommended habits to keep you and your data secure.

  • CSSLP®: Secure Software Requirements

    CSSLP®: Secure Software Requirements

    Understanding how to gather requirement to ensure that systems and applications meet both business and security needs. Areas of focus include data classification, privacy and threat modeling.

  • Threat Modeling: The Big Picture

    Threat Modeling: The Big Picture

    In this course, you'll be provided with a high-level overview of what threat modeling is, how it can be used, and potential challenges you may face when attempting to use threat modeling for your day to day activities, projects, or environments.

  • CISSP® - Security and Risk Management

    CISSP® - Security and Risk Management

    ISC(2)'s CISSP examination is one of the most highly valued certifications in the information security profession. Take the first step towards gaining the knowledge needed to tackle the first domain of the CISSP.

  • Threat Modeling Fundamentals

    Threat Modeling Fundamentals

    Threat modeling can help mitigate security risks in an application in a repeatable and efficient way. This course teaches you the fundamentals of threat modeling and what the different approaches and methodologies are.

  • Security for Hackers and Developers: Overview

    Security for Hackers and Developers: Overview

    Enterprises around the world are concerned about cyber security. This course will teach you the fundamentals of information security applicable in any software development discipline.

 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top