info@prefortconsult.com
+447455884242
Follow Us :
Home
About Us
Services
Trainings
Courses
Resources
Ebooks
Templates
Videos Tutorials
Media
Blog
FAQs
Contact
Ebooks
Home
Ebooks
9 Steps to Cybersecurity EN
AWS CESG UK Cloud Security Principles
Blackmores Case Study ISO-27001 TNT
CIS Community Defense Model-1
CIS Beginners Guide to Secure Cloud Configuration
Clause by Clause Explanation of ISO-27001 EN
Cloud Computing Security Risk Assessment (2)
Cloud Incident Response Framework 4-30-21(1)
Cryptography made simple
CSA Cloud Threat Modeling
Cyber Security Tools and Tactics
The Elastic Guide to Threat Hunting
Hands on Cyber Security for Architects
Human Factor in Cyber Security Overview
Practical Mobile Forensics
Introduction to Artificial Intelligence
Introduction To Cyber Security
MITRE ATT&CK Framework
Russia’s Strategy In Cyberspace
Understanding Cryptography
Security Guidelines for Providing & Consuming APIs-v1
OWASP - Web Penetration Testing Guide
THE 5 LEVELS OF LEADERSHIP - John C. Maxwell
Top 10 Cyber Threats Facing Businesses Today [2020]
Type of Firewalls
Internal Audit Ask This
Wp-Securing Weak Points in Serverless Architectures Risks & Recommendations(1)
Nmap Network Exploration & Security Auditing Cook Book
OWASP Application Security Verification Standard 4.0.2 EN
Risk Management for Automotive Cybersecurity
Enterprise Architecture Review Checklist SAAS-Cloud Solutions
Enterprise Vulnerability Management Foundations
AWS Security Best Practices
SOC Overview Guide for SOC Analyst
Microsoft Incident Response Playbook
New ISO-27001-2022-1666702031
Network Topologies
Security Architecture and Design
Security Awareness Deployment Guide
How to become a cyber security expert?
Firewall Architectures
ISO27k ISMS Information Risk Management Process
Support
×
Hello!
Click one of our contacts below to chat on WhatsApp
Support
Prefort consult
×