For a better view on Inspire Cayman Training, Update Your Browser.

Exploring SecOps Tools (Online Courses)

Elevate your career trajectory with our premier online course, designed to sharpen your competitive edge. Explore our curated selection of top-tier digital programs to hone your skills and propel your professional journey forward. Experience transformative learning tailored to empower your career advancement in today's dynamic landscape.
Course Category
Price on Request
Start Learning
This Course Includes
  • 8 hours 20 minutes
    of self-paced video lessons
  • 7 Programs
    crafting your path to success
  • Completion Certificate
    awarded on course completion

Exploring Prompt Engineering Techniques

Price on Request 1 hour 55 minutes
Different types of prompts serve distinct purposes when interacting with language models. Each type enables tailored interactions, from seeking answers and generating code to engaging in creative storytelling or eliciting opinions. In this course, you will learn the four elements of a prompt: context, instruction, input data, and output format. Next, will also explore prompt categories, such as open-ended, close-ended, multi-part, scenario-based, and opinion-based. Finally, you will look at different types of prompts based on the output that they provide. You will use prompts that generate objective facts, abstractive and extractive summaries, classification and sentiment analysis, and answers to questions. You'll tailor prompts to perform grammar and tone checks, ideation and roleplay, and mathematical and logical reasoning.
Perks of Course
Certificate: Yes
CPD Points: 114
Compliance Standards: AICC

Exploring SecOps Tools: Digital Forensic Collection with Autopsy

Price on Request 45 minutes
Autopsy is an open-source digital forensic platform that simplifies the deployment of many of the utilities and plugins found in The Sleuth Kit forensic toolkit. Autopsy provides an easy-to-use graphical interface for command line digital investigation analysis tools, and provides fast, thorough, and efficient hard drive investigation solutions. In this course, discover the Autopsy platform, including features like timeline analysis, keyword searching, email analysis, and registry analysis. Investigate Autopsy benefits, such as ease of use, extensibility, efficiency, and cost effectiveness. Then, download and install Autopsy to explore the general configuration options panel along with the video triage and law enforcement bundle add-on modules. Finally, create a new case, view case details and the data source summary, and practice the various ways to add a data source.
Perks of Course
Certificate: Yes
CPD Points: 47
Compliance Standards: AICC

Exploring SecOps Tools: Port Scanning with Netcat

Price on Request 1 hour 30 minutes
The Netcat utility is a free and easy-to-use tool that is commonly used to monitor the flow of traffic between systems on a computer network. Netcat has various capabilities, including port scanning, port listening, transferring files, and backdoor enabling. With this course, learn how to use the Netcat utility. Explore the history of the Netcat utility and learn how to download and install the program. Next, work with common Netcat commands and options and examine Netcat features like SSL encryption, traffic redirection, and connection brokering. Finally, learn how to execute basic Netcat commands, perform port scanning, and use Netcat TCP server and client commands. Upon completion, you'll be able to use the Netcat utility to perform port scanning.
Perks of Course
Certificate: Yes
CPD Points: 63
Compliance Standards: AICC

Exploring SecOps Tools: Securing Passwords with hashcat

Price on Request 1 hour 25 minutes
hashcat is a popular password cracking tool which is often used in ethical hacking exercises by penetration testers and sysadmins. It is, however, often also used for illicit purposes by cybercriminals and spies to compromise and breach vulnerabilities. Explore the many features and capabilities of the hashcat tool, and discover the purpose and vulnerabilities password hashes present. Explore the characteristics of the core hashcat attack modes that include dictionary attacks, combinator attacks, brute-force attacks, hybrid attacks, and association attacks. Explore how to download and install hashcat and discover techniques to crack passcodes. Lastly, explore requirements for building a capable password cracking systems and explore the required steps to successfully crack a WPA/WPA2 using hashcat. Upon completion, you'll be able to secure passwords using hashcat.
Perks of Course
Certificate: Yes
CPD Points: 68
Compliance Standards: AICC

Exploring SecOps Tools: SQL Injection Testing Using sqlmap

Price on Request 50 minutes
sqlmap is an open-source penetration testing tool used to help security professionals automate the detection and exploitation of SQL injection vulnerabilities in web applications. It fully supports a broad range of databases and six SQL injection techniques. Through this course, learn how sqlmap works with common databases and helps automate common SQL injection techniques. Explore common sqlmap use cases and how to access, download, and install sqlmap. Next, discover the program's dependencies, including its various Python libraries. Finally, learn how to use sqlmap and Burp for database enumeration and dumping and bypass admin logins using sqlmap and SQL injections techniques. Upon completion, you'll be able to use sqlmap for SQL injection testing.
Perks of Course
Certificate: Yes
CPD Points: 48
Compliance Standards: AICC

Exploring SecOps Tools: Using the Aircrack-ng Suite of Tools

Price on Request 1 hour
Aircrack-ng is a complete suite of tools commonly used to assess Wi-Fi network security and perform network security hardening. These tools focus primarily on monitoring, attacking, testing, and password cracking. All Aircrack-ng individual utilities are command-line based and allow for maximum scripting utilities. In this course, you will explore the Aircrack-ng suite of tools and discover the individual utilities found within. Compare Aircrack-ng to alternatives including Trackerjacker, Eaphammer, Wifiphisher, Wireshark, Airgeddon, and Acrylic Wi-Fi, and recognize considerations for installing drivers with Aircrack-ng. Discover how to download and install Aircrack-ng and explore how to navigate and execute common commands. Finally, discover how to use Aircrack-ng to crack WEP and WPA/WPA2 passwords and explore command options such as -a, -e, -b, -p, -q, -C, -I.
Perks of Course
Certificate: Yes
CPD Points: 61
Compliance Standards: AICC

Exploring SecOps Tools: Using the Social-Engineer Toolkit

Price on Request 55 minutes
The Social-Engineer Toolkit (SET) is used by security professionals and penetration testers to perform advanced attacks and social engineering. The SET offers attack vectors that help carry out human-side penetration testing exercises. In this course, you'll explore the SET and its capabilities and features. You'll also explore SET attack vectors, including phishing, web, infectious media generator, payload and listeners, and mass mailer attacks. Discover where to access installation files and how to install the SET. Learn how to start using the SET by launching the spear phishing module. Finally, explore how to perform web-­based attacks, a credential harvester attack, and a man-in-the-middle attack.
Perks of Course
Certificate: Yes
CPD Points: 57
Compliance Standards: AICC