John's Security: InfoSec Certificates

  1. Fundamentals
    1. Corporate Information Security Awareness - Proofpoint 2014 from Proofpoint
    2. Saviynt Information Security Annual Training from Saviynt
    3. 2024 Kevin Mitnick Security Awareness Training from KnowBe4 by Kevin Mitnick
    4. Top 5 Security Awareness Fundamentals from KnowBe4
    5. Cybersecurity: Every second counts from KnowBe4
    6. Non-Technical Security from KnowBe4
  2. Concepts
    1. Voice on Security: Piggybacking from KnowBe4
  3. Zero Trust
    1. Zero Trust Architecture (ZTA): Getting Started from Pluralsight by Dr. Lyron H. Andrews
    2. Zero Trust Architecture (ZTA): Strategize and Establish from Pluralsight by Dr. Lyron H. Andrews
  4. General Data Protection Regulation (GDPR)
    1. General Data Protection Regulation (GDPR) 2024 from Traliant
    2. General Data Protection Regulation (GDPR) "2023" from Traliant
  5. California Consumer Privacy Act (CCPA)
    1. California Consumer Privacy Act (CCPA & CPRA) V2 from Traliant
  6. Passwords
    1. Secure Passwords With Quiz from KnowBe4
  7. Email Protection
    1. 2024 Kevin Mitnick Enabled Content Demonstration from KnowBe4 by Kevin Mitnick
    2. Kevin Mitnick - Two-Factor Authentication Attack from KnowBe4 by Kevin Mitnick
    3. Fake Meeting Request Demonstration from KnowBe4 by Kevin Mitnick
    4. Phil Hendrie & Kevin Mitnick Pretexting - Credential Harvesting Attack from KnowBe4 by Kevin Mitnick
    5. AI, Phishing, and Cybersafety from KnowBe4
    6. Spear Phishing in Action from KnowBe4
    7. Phish or Treat? - Phishing Edition from KnowBe4
    8. Callback Phishing: Email and Phone-Based Cyberattacks from KnowBe4
    9. Business Email Compromise: Not Just for Execs and Finance Anymore from KnowBe4
    10. What is CEO Fraud? from KnowBe4
    11. Criminal Minds: Spear Phishing from KnowBe4
    12. Browser-in-the-Browser Attacks from KnowBe4
  8. Web Surfing
    1. Safe Surfing 101 from KnowBe4
  9. Applications
    1. Do You Know What Third-Party Apps Are? from KnowBe4
  10. Endpoints
    1. Dangers of USBs from KnowBe4
  11. Mobile
    1. Protect Your Mobile Device from Attack from Grovo
  12. Malware
    1. Malware as a Service from KnowBe4
  13. Ransomware
    1. Ransomware: Blackmail Using Encrypted Data from KnowBe4
    2. World Wild Web: Ransomware from KnowBe4
  14. Social Engineering
    1. Pretexting - "Tech Support" Social Engineering? from KnowBe4
  15. Disaster Recovery
    1. Security and Disaster Preparedness from KnowBe4
  16. Proofpoint
    1. Enterprise Protection/Privacy Accredited Engineer from Proofpoint
  17. Case Studies
    1. Security Hot Takes: CrowdStrike Outage Post-mortem from Pluralsight by Michael Teske, Aaron Rosenmund, Bri Frost

Fundamentals (6)

Corporate Information Security Awareness - Proofpoint 2014 from Proofpoint

John's Corporate Information Security Awareness - Proofpoint 2014 from Proofpoint

Saviynt Information Security Annual Training from Saviynt

John's Saviynt Information Security Annual Training from Saviynt

2024 Kevin Mitnick Security Awareness Training from KnowBe4 by Kevin Mitnick

John's 2024 Kevin Mitnick Security Awareness Training from KnowBe4 by Kevin Mitnick

Top 5 Security Awareness Fundamentals from KnowBe4

John's Top 5 Security Awareness Fundamentals from KnowBe4

Cybersecurity: Every second counts from KnowBe4

John's Cybersecurity: Every second counts from KnowBe4

Non-Technical Security from KnowBe4

John's Non-Technical Security from KnowBe4

Concepts (1)

Voice on Security: Piggybacking from KnowBe4

John's Voice on Security: Piggybacking from KnowBe4

Zero Trust (2)

Zero Trust Architecture (ZTA): Getting Started from Pluralsight by Dr. Lyron H. Andrews

John's Zero Trust Architecture (ZTA): Getting Started from Pluralsight by Dr. Lyron H. Andrews

Zero Trust Architecture (ZTA): Strategize and Establish from Pluralsight by Dr. Lyron H. Andrews

John's Zero Trust Architecture (ZTA): Strategize and Establish from Pluralsight by Dr. Lyron H. Andrews

General Data Protection Regulation (GDPR) (2)

General Data Protection Regulation (GDPR) 2024 from Traliant

John's General Data Protection Regulation (GDPR) 2024 from Traliant

John's General Data Protection Regulation (GDPR) 2024 from Traliant

General Data Protection Regulation (GDPR) "2023" from Traliant

John's General Data Protection Regulation (GDPR)

John's General Data Protection Regulation (GDPR)

California Consumer Privacy Act (CCPA) (1)

California Consumer Privacy Act (CCPA & CPRA) V2 from Traliant

John's California Consumer Privacy Act (CCPA & CPRA) V2 from Traliant

Passwords (1)

Secure Passwords With Quiz from KnowBe4

John's Secure Passwords With Quiz from KnowBe4

Email Protection (12)

2024 Kevin Mitnick Enabled Content Demonstration from KnowBe4 by Kevin Mitnick

John's 2024 Kevin Mitnick Enabled Content Demonstration from KnowBe4 by Kevin Mitnick

Kevin Mitnick - Two-Factor Authentication Attack from KnowBe4 by Kevin Mitnick

John's Kevin Mitnick - Two-Factor Authentication Attack from KnowBe4 by Kevin Mitnick

Fake Meeting Request Demonstration from KnowBe4 by Kevin Mitnick

John's Fake Meeting Request Demonstration from KnowBe4 by Kevin Mitnick

Phil Hendrie & Kevin Mitnick Pretexting - Credential Harvesting Attack from KnowBe4 by Kevin Mitnick

John's Phil Hendrie & Kevin Mitnick Pretexting - Credential Harvesting Attack from KnowBe4 by Kevin Mitnick

AI, Phishing, and Cybersafety from KnowBe4

John's AI, Phishing, and Cybersafety from KnowBe4

Spear Phishing in Action from KnowBe4

John's Spear Phishing in Action from KnowBe4

Phish or Treat? - Phishing Edition from KnowBe4

John's Phish or Treat? - Phishing Edition from KnowBe4

Callback Phishing: Email and Phone-Based Cyberattacks from KnowBe4

John's Callback Phishing: Email and Phone-Based Cyberattacks from KnowBe4

Business Email Compromise: Not Just for Execs and Finance Anymore from KnowBe4

John's Business Email Compromise: Not Just for Execs and Finance Anymore from KnowBe4

What is CEO Fraud? from KnowBe4

John's What is CEO Fraud? from KnowBe4

Criminal Minds: Spear Phishing from KnowBe4

John's Criminal Minds: Spear Phishing from KnowBe4

Browser-in-the-Browser Attacks from KnowBe4

John's Browser-in-the-Browser Attacks from KnowBe4

Web Surfing (1)

Safe Surfing 101 from KnowBe4

John's Safe Surfing 101 from KnowBe4

Applications (1)

Do You Know What Third-Party Apps Are? from KnowBe4

John's Do You Know What Third-Party Apps Are? from KnowBe4

Endpoints (1)

Dangers of USBs from KnowBe4

John's Dangers of USBs from KnowBe4

Mobile (1)

Protect Your Mobile Device from Attack from Grovo

John's Protect Your Mobile Device from Attack from Grovo

Malware (1)

Malware as a Service from KnowBe4

John's Malware as a Service from KnowBe4

Ransomware (2)

Ransomware: Blackmail Using Encrypted Data from KnowBe4

John's Ransomware: Blackmail Using Encrypted Data from KnowBe4

World Wild Web: Ransomware from KnowBe4

John's World Wild Web: Ransomware from KnowBe4

Social Engineering (1)

Pretexting - "Tech Support" Social Engineering? from KnowBe4

John's Pretexting -

Disaster Recovery (1)

Security and Disaster Preparedness from KnowBe4

John's Security and Disaster Preparedness from KnowBe4

Proofpoint (1)

Enterprise Protection/Privacy Accredited Engineer from Proofpoint

John's Enterprise Protection/Privacy Accredited Engineer from Proofpoint

Case Studies (1)

Security Hot Takes: CrowdStrike Outage Post-mortem from Pluralsight by Michael Teske, Aaron Rosenmund, Bri Frost

John's Security Hot Takes: CrowdStrike Outage Post-mortem from Pluralsight by Michael Teske, Aaron Rosenmund, Bri Frost