Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- 001 what are networking devices (19:56)
- 002 what is P address and IP address classification (22:50)
- 003 What is NAT and PAT (13:45)
- 004 Tell me few port numbers which you know (22:01)
- 005 How a Firewall Works (2:51)
- 006 How VPN works (5:17)
- 007 What is Symmetric and Asymmetric Encryption (19:55)
- 008 Explain CIA triad (12:35)
- 009 What is the difference in between SSL and HTTPS (2:22)
- 010 How do you stay up to date on Cyber Security news and latest attacks (11:09)
- 011 What is the difference between Virus and Warm (3:22)
- 012 Explain SQL Injection Attack (9:24)
- 013 What is botnet (4:36)
- 014 What is Brute Force Attack (22:09)
- 001 What is Security Operation Center (11:19)
- 002 What are various Security Devices used in your orrganization (39:53)
- 003 How does a SOC Team manage or work in an Organization (26:23)
- 004 What are the Roles and Responsibilities of SOC Engineer (30:37)
- 005 what is your SOC Team Model (17:43)
- 006 What are the fields in Sample Incident Ticket - ServiceNow (21:39)
- 007 what are Service level Agreements for the SOC Incidents (9:04)
- 008 What is False Positive Analysis or what are various outcomes of Analysis (18:02)
- 009 How many Logs sources are there in your organization (9:01)
- 010 What are the steps in Incident Response Life Cycle (23:53)
- 011 Can you please explain what you will do after getting an alert (Alert IR FLow) (10:33)
- 012 How will you manage work in shifts (11:28)
- 013 How do you handle P1, P2, P3 and P4 Incidents (14:46)
- 001 How do you analyze if receive a Brute Force Attack Alert (19:56)
- 002 what will you do if receive a Malware Attack Alert (30:58)
- 003 How do you analyze Phishing email attack (42:11)
- 004 How do you Analyze SQL Injection attack (19:54)
- 005 How do you analyze DDOS Attack (18:33)
- 006 How do you analyze if a suspicious IP detected in outbound traffic (4:56)
- 38783204-GMT20220114-023122-Recording-1920x1080 (42:11)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.