ELearnSecurity
   HOME

TheInfoList



OR:

eLearnSecurity (eLS) is an
information technology Information technology (IT) is the use of computers to create, process, store, retrieve, and exchange all kinds of Data (computing), data . and information. IT forms part of information and communications technology (ICT). An information te ...
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
company that develops and provides certifications with a practical focus. eLearnSecurity deliver course material
electronically The field of electronics is a branch of physics and electrical engineering that deals with the emission, behaviour and effects of electrons using electronic devices. Electronics uses active devices to control electron flow by amplification ...
through the
distance learning Distance education, also known as distance learning, is the education of students who may not always be physically present at a school, or where the learner and the teacher are separated in both time and distance. Traditionally, this usually in ...
model.


Courses

eLearnSecurity was founded with the simple mission of revolutionizing the way IT professionals develop their information security skills. Based in Cary, North Carolina with offices and employees around the United States and Europe, eLearnSecurity places among worldwide leaders in cyber security training. Through a blend of online training and real-world simulations, eLearnSecurity is preparing IT professionals, governments, and businesses to tackle cyber threats and create a safer, more secure virtual experience. Courses offered by eLearnSecurity focus on
penetration testing A penetration test, colloquially known as a pen test or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment ...
, software reverse engineering, website security,
mobile application A mobile application or app is a computer program or software application designed to run on a mobile device such as a phone, tablet, or watch. Mobile applications often stand in contrast to desktop applications which are designed to run on des ...
security and network defense.


See also

*
Ethical Hacking A white hat (or a white-hat hacker, a whitehat) is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabili ...
* BackBox Linux
INE


References

* Professional titles and certifications Information technology qualifications Hacking (computer security) {{Computer-security-stub