John's Security: InfoSec Certificates

  1. Fundamentals
    1. Corporate Information Security Awareness - Proofpoint 2014 from Proofpoint
    2. Saviynt Information Security Annual Training from Saviynt
    3. 2024 Kevin Mitnick Security Awareness Training from KnowBe4 by Kevin Mitnick
    4. 2024 Common Threats from KnowBe4
    5. Top 5 Security Awareness Fundamentals from KnowBe4
    6. Cybersecurity: Every second counts from KnowBe4
    7. Non-Technical Security from KnowBe4
  2. Concepts
    1. Voice on Security: Piggybacking from KnowBe4
  3. General Data Protection Regulation (GDPR)
    1. General Data Protection Regulation (GDPR) 2024 from Traliant
    2. General Data Protection Regulation (GDPR) "2023" from Traliant
  4. California Consumer Privacy Act (CCPA)
    1. California Consumer Privacy Act (CCPA & CPRA) V2 from Traliant
  5. Phishing
    1. Microsoft Teams Phishing Demo from KnowBe4
    2. Video: Reality Bytes: Vishing from KnowBe4
    3. The Art of Phishing from KnowBe4
  6. Two-Factor Authentication
    1. Kevin Mitnick - Two-Factor Authentication Attack from KnowBe4 by Kevin Mitnick
    2. Social Engineering Two-Factor Authentication Access Demonstration from KnowBe4 by Kevin Mitnick
    3. Don't Be Like Rick: Two-Factor Authentication from KnowBe4
    4. Don't Be Like Rick: Two-Factor Authentication from KnowBe4
  7. Zero Trust
    1. Zero Trust Architecture (ZTA): Getting Started from Pluralsight by Dr. Lyron H. Andrews
    2. Zero Trust Architecture (ZTA): Strategize and Establish from Pluralsight by Dr. Lyron H. Andrews
  8. Passwords
    1. Secure Passwords With Quiz from KnowBe4
  9. Email Protection
    1. 2024 Kevin Mitnick Enabled Content Demonstration from KnowBe4 by Kevin Mitnick
    2. Fake Meeting Request Demonstration from KnowBe4 by Kevin Mitnick
    3. Phil Hendrie & Kevin Mitnick Pretexting - Credential Harvesting Attack from KnowBe4 by Kevin Mitnick
    4. AI, Phishing, and Cybersafety from KnowBe4
    5. Spear Phishing in Action from KnowBe4
    6. Phish or Treat? - Phishing Edition from KnowBe4
    7. Callback Phishing: Email and Phone-Based Cyberattacks from KnowBe4
    8. Business Email Compromise: Not Just for Execs and Finance Anymore from KnowBe4
    9. What is CEO Fraud? from KnowBe4
    10. Criminal Minds: Spear Phishing from KnowBe4
    11. Browser-in-the-Browser Attacks from KnowBe4
  10. Web Surfing
    1. Safe Surfing 101 from KnowBe4
  11. Applications
    1. Do You Know What Third-Party Apps Are? from KnowBe4
  12. Endpoints
    1. Dangers of USBs from KnowBe4
  13. Mobile
    1. Protect Your Mobile Device from Attack from Grovo
  14. Malware
    1. Malware as a Service from KnowBe4
  15. Ransomware
    1. Ransomware: Blackmail Using Encrypted Data from KnowBe4
    2. World Wild Web: Ransomware from KnowBe4
  16. Social Engineering
    1. Pretexting - "Tech Support" Social Engineering? from KnowBe4
  17. Disaster Recovery
    1. Security and Disaster Preparedness from KnowBe4
  18. Personas
    1. How Security Awareness Applies to Me: Educators from KnowBe4
  19. Microsoft
    1. Microsoft Defender: Introduction from Pluralsight by Rishalin Pillay
  20. Proofpoint
    1. Enterprise Protection/Privacy Accredited Engineer from Proofpoint
  21. Case Studies
    1. Security Hot Takes: CrowdStrike Outage Post-mortem from Pluralsight by Michael Teske, Aaron Rosenmund, Bri Frost

Fundamentals (7)

Corporate Information Security Awareness - Proofpoint 2014 from Proofpoint

John's Corporate Information Security Awareness - Proofpoint 2014 from Proofpoint

Saviynt Information Security Annual Training from Saviynt

John's Saviynt Information Security Annual Training from Saviynt

John's Saviynt Information Security Annual Training from Saviynt

2024 Kevin Mitnick Security Awareness Training from KnowBe4 by Kevin Mitnick

John's 2024 Kevin Mitnick Security Awareness Training from KnowBe4 by Kevin Mitnick

2024 Common Threats from KnowBe4

John's 2024 Common Threats from KnowBe4

Top 5 Security Awareness Fundamentals from KnowBe4

John's Top 5 Security Awareness Fundamentals from KnowBe4

Cybersecurity: Every second counts from KnowBe4

John's Cybersecurity: Every second counts from KnowBe4

Non-Technical Security from KnowBe4

John's Non-Technical Security from KnowBe4

Concepts (1)

Voice on Security: Piggybacking from KnowBe4

John's Voice on Security: Piggybacking from KnowBe4

General Data Protection Regulation (GDPR) (2)

General Data Protection Regulation (GDPR) 2024 from Traliant

John's General Data Protection Regulation (GDPR) 2024 from Traliant

John's General Data Protection Regulation (GDPR) 2024 from Traliant

John's General Data Protection Regulation (GDPR) 2024 from Traliant

General Data Protection Regulation (GDPR) "2023" from Traliant

John's General Data Protection Regulation (GDPR)

John's General Data Protection Regulation (GDPR)

California Consumer Privacy Act (CCPA) (1)

California Consumer Privacy Act (CCPA & CPRA) V2 from Traliant

John's California Consumer Privacy Act (CCPA & CPRA) V2 from Traliant

John's California Consumer Privacy Act (CCPA & CPRA) V2 from Traliant

Phishing (3)

Microsoft Teams Phishing Demo from KnowBe4

John's Microsoft Teams Phishing Demo from KnowBe4

Video: Reality Bytes: Vishing from KnowBe4

John's Video: Reality Bytes: Vishing from KnowBe4

The Art of Phishing from KnowBe4

John's The Art of Phishing from KnowBe4

Two-Factor Authentication (4)

Kevin Mitnick - Two-Factor Authentication Attack from KnowBe4 by Kevin Mitnick

John's Kevin Mitnick - Two-Factor Authentication Attack from KnowBe4 by Kevin Mitnick

Social Engineering Two-Factor Authentication Access Demonstration from KnowBe4 by Kevin Mitnick

John's Social Engineering Two-Factor Authentication Access Demonstration from KnowBe4 by Kevin Mitnick

Don't Be Like Rick: Two-Factor Authentication from KnowBe4

John's Don't Be Like Rick: Two-Factor Authentication from KnowBe4

Don't Be Like Rick: Two-Factor Authentication from KnowBe4

John's Don't Be Like Rick: Two-Factor Authentication from KnowBe4

Zero Trust (2)

Zero Trust Architecture (ZTA): Getting Started from Pluralsight by Dr. Lyron H. Andrews

John's Zero Trust Architecture (ZTA): Getting Started from Pluralsight by Dr. Lyron H. Andrews

Zero Trust Architecture (ZTA): Strategize and Establish from Pluralsight by Dr. Lyron H. Andrews

John's Zero Trust Architecture (ZTA): Strategize and Establish from Pluralsight by Dr. Lyron H. Andrews

Passwords (1)

Secure Passwords With Quiz from KnowBe4

John's Secure Passwords With Quiz from KnowBe4

Email Protection (11)

2024 Kevin Mitnick Enabled Content Demonstration from KnowBe4 by Kevin Mitnick

John's 2024 Kevin Mitnick Enabled Content Demonstration from KnowBe4 by Kevin Mitnick

Fake Meeting Request Demonstration from KnowBe4 by Kevin Mitnick

John's Fake Meeting Request Demonstration from KnowBe4 by Kevin Mitnick

Phil Hendrie & Kevin Mitnick Pretexting - Credential Harvesting Attack from KnowBe4 by Kevin Mitnick

John's Phil Hendrie & Kevin Mitnick Pretexting - Credential Harvesting Attack from KnowBe4 by Kevin Mitnick

AI, Phishing, and Cybersafety from KnowBe4

John's AI, Phishing, and Cybersafety from KnowBe4

Spear Phishing in Action from KnowBe4

John's Spear Phishing in Action from KnowBe4

Phish or Treat? - Phishing Edition from KnowBe4

John's Phish or Treat? - Phishing Edition from KnowBe4

Callback Phishing: Email and Phone-Based Cyberattacks from KnowBe4

John's Callback Phishing: Email and Phone-Based Cyberattacks from KnowBe4

Business Email Compromise: Not Just for Execs and Finance Anymore from KnowBe4

John's Business Email Compromise: Not Just for Execs and Finance Anymore from KnowBe4

What is CEO Fraud? from KnowBe4

John's What is CEO Fraud? from KnowBe4

Criminal Minds: Spear Phishing from KnowBe4

John's Criminal Minds: Spear Phishing from KnowBe4

Browser-in-the-Browser Attacks from KnowBe4

John's Browser-in-the-Browser Attacks from KnowBe4

Web Surfing (1)

Safe Surfing 101 from KnowBe4

John's Safe Surfing 101 from KnowBe4

Applications (1)

Do You Know What Third-Party Apps Are? from KnowBe4

John's Do You Know What Third-Party Apps Are? from KnowBe4

Endpoints (1)

Dangers of USBs from KnowBe4

John's Dangers of USBs from KnowBe4

Mobile (1)

Protect Your Mobile Device from Attack from Grovo

John's Protect Your Mobile Device from Attack from Grovo

Malware (1)

Malware as a Service from KnowBe4

John's Malware as a Service from KnowBe4

Ransomware (2)

Ransomware: Blackmail Using Encrypted Data from KnowBe4

John's Ransomware: Blackmail Using Encrypted Data from KnowBe4

World Wild Web: Ransomware from KnowBe4

John's World Wild Web: Ransomware from KnowBe4

Social Engineering (1)

Pretexting - "Tech Support" Social Engineering? from KnowBe4

John's Pretexting -

Disaster Recovery (1)

Security and Disaster Preparedness from KnowBe4

John's Security and Disaster Preparedness from KnowBe4

Personas (1)

How Security Awareness Applies to Me: Educators from KnowBe4

John's How Security Awareness Applies to Me: Educators from KnowBe4

Microsoft (1)

Microsoft Defender: Introduction from Pluralsight by Rishalin Pillay

John's Microsoft Defender: Introduction from Pluralsight by Rishalin Pillay

Proofpoint (1)

Enterprise Protection/Privacy Accredited Engineer from Proofpoint

John's Enterprise Protection/Privacy Accredited Engineer from Proofpoint

Case Studies (1)

Security Hot Takes: CrowdStrike Outage Post-mortem from Pluralsight by Michael Teske, Aaron Rosenmund, Bri Frost

John's Security Hot Takes: CrowdStrike Outage Post-mortem from Pluralsight by Michael Teske, Aaron Rosenmund, Bri Frost