Документы

Whitepaper, политики, лицензии и юридическая документация.

Whitepaper — English

Scope, ownership, rules of engagement for security assessments

Whitepaper — Русский

Область аудита, ответственность и правила проведения тестирования

Whitepaper — العربية

النطاق، الملكية، وقواعد إجراء تدقيق الأمن السيبراني

Политика конфиденциальности — Тень Архива: Overmind Protocol

Политика конфиденциальности игры «Тень Архива: Overmind Protocol»

Documentation License — English

CC BY‑NC 4.0 — Usage terms for reports and templates

Лицензия — Русский

CC BY‑NC 4.0 — Условия использования отчётов и шаблонов

الترخيص — العربية

CC BY‑NC 4.0 — شروط استخدام التقارير والقوالب

Trademarks — English

DataDef branding and trademark notice

Товарные знаки — Русский

Уведомление о торговой марке DataDef

العلامات التجارية — العربية

إشعار العلامة التجارية لـ DataDef

Coursera Coursera
IBM Credly

IT Fundamentals for Cybersecurity

  • Introduction to Cybersecurity Tools & Cyberattacks
  • Operating Systems: Overview, Administration, and Security
  • Cybersecurity Compliance Framework, Standards & Regulations
  • Computer Networks and Network Security
Coursera Coursera EC-Council

Cybersecurity Attack and Defense Fundamentals

  • Ethical Hacking Essentials (EHE)
  • Network Defense Essentials (NDE)
  • Digital Forensics Essentials (DFE)
Verify on Coursera
Coursera Coursera
Google Credly

Google Cybersecurity

  • Foundations of Cybersecurity
  • Play It Safe: Manage Security Risks
  • Connect and Protect: Networks and Network Security
  • Tools of the Trade: Linux and SQL
  • Assets, Threats, and Vulnerabilities
  • Sound the Alarm: Detection and Response
  • Automate Cybersecurity Tasks with Python
  • Put It to Work: Prepare for Cybersecurity Jobs
Coursera Coursera
Microsoft Credly

Microsoft Cybersecurity Analyst

  • Introduction to Computers and Operating Systems and Security
  • Introduction to Networking and Cloud Computing
  • Cybersecurity Threat Vectors and Mitigation
  • Cybersecurity Identity and Access Solutions using Azure AD
  • Cybersecurity Solutions and Microsoft Defender
  • Cybersecurity Tools and Technologies
  • Cybersecurity Management and Compliance
  • Advanced Cybersecurity Concepts and Capstone Project
Coursera Coursera Learnkarts

Ethical Hacking

  • Ethical Hacking Fundamentals
  • System & Network Security Essentials
  • Advanced Ethical Hacking & Cybersecurity
  • Ethical Hacking Practice Project & Questions
Verify on Coursera