{"data":{"free_courses":[{"id":"73259f12-4261-47d6-99ae-a4a0151439a2","name":"Make In-house Hacking and Pentesting Lab","brief":"Build your \"Hacking\" lab on your own laptop\/computer to improve your skills","level":1,"timing":90,"category":{"id":"ff932fce-fbdf-46ac-8b38-79c8f5ed7c69","name":"Vulnerability Assessment and Pentesting","color_class":"#920EF6","category_icon_class_name":"","image":null},"course_type":1,"image":{"id":"ca4d45b7-d289-46c9-8c36-a7ca65ffbbb1","path":"\/uploads\/8db576d2-ca9f-46ed-b312-691e53751d4f.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/8db576d2-ca9f-46ed-b312-691e53751d4f.webp","mime_type":"image\/jpeg"},"url":"https:\/\/learn.eccouncil.org\/course\/73259f12-4261-47d6-99ae-a4a0151439a2","slug_url":"make-in-house-hacking-and-pentesting-lab","is_free":1,"price":"0","discount_price":"","reviews_count":2165,"rate":4.9,"enrolled":false,"enrollment":6435,"completion_percentage":0,"is_finished":false,"has_access":false,"eccouncil_url":null,"lab_count":0,"chapter_count":7,"completed_certification":false},{"id":"2a7f9824-8e48-45fb-a629-658d83e2a574","name":"Beginning Oracle WebLogic for Administrators","brief":"Introductory course to Oracle WebLogic 12c. Learn how to download, install, and create WebLogic domains.","level":1,"timing":73,"category":{"id":"9ecd4108-b077-4880-b604-0bab4715dbbf","name":"Software Development","color_class":null,"category_icon_class_name":null,"image":null},"course_type":1,"image":{"id":"1f555a7e-b90a-4539-b98d-e6e4c8c74ff4","path":"\/uploads\/d2326bd1-c2ad-46e0-aed8-f6fe833b7d7d.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/d2326bd1-c2ad-46e0-aed8-f6fe833b7d7d.webp","mime_type":"image\/jpeg"},"url":"https:\/\/learn.eccouncil.org\/course\/2a7f9824-8e48-45fb-a629-658d83e2a574","slug_url":"Beginning-Oracle-WebLogic-for-Administrators","is_free":1,"price":"0","discount_price":"","reviews_count":476,"rate":4.9,"enrolled":false,"enrollment":1079,"completion_percentage":0,"is_finished":false,"has_access":false,"eccouncil_url":null,"lab_count":0,"chapter_count":2,"completed_certification":false},{"id":"9dd2c302-04fd-4f38-b926-ff6a5e5f8c0f","name":"Quick Start Guide to Oracle SOA 12c","brief":"Get up and running with Oracle SOA 12c using the Quick Start distribution.","level":2,"timing":60,"category":{"id":"9ecd4108-b077-4880-b604-0bab4715dbbf","name":"Software Development","color_class":null,"category_icon_class_name":null,"image":null},"course_type":1,"image":{"id":"f5560d32-493f-4190-9bb6-d2adc12bd01f","path":"\/uploads\/d557e2d9-7978-43fc-89ae-7d6b46189413.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/d557e2d9-7978-43fc-89ae-7d6b46189413.webp","mime_type":"image\/jpeg"},"url":"https:\/\/learn.eccouncil.org\/course\/9dd2c302-04fd-4f38-b926-ff6a5e5f8c0f","slug_url":"Quick-Start-Guide-to-Oracle-SOA-12c","is_free":1,"price":"0","discount_price":"","reviews_count":207,"rate":4.8,"enrolled":false,"enrollment":346,"completion_percentage":0,"is_finished":false,"has_access":false,"eccouncil_url":null,"lab_count":0,"chapter_count":2,"completed_certification":false},{"id":"e2ec4018-8923-4635-bb47-b87167258752","name":"Scrum Certification + Scrum Master + Agile Scrum Training","brief":"Overview of Scrum Agile project management + common questions + tips to pass PSM scrum org ONLINE Scrum Master Certification","level":1,"timing":120,"category":{"id":"9ecd4108-b077-4880-b604-0bab4715dbbf","name":"Software Development","color_class":null,"category_icon_class_name":null,"image":null},"course_type":1,"image":{"id":"006d4bcb-0d30-4548-b8b5-d5a7c8952bfa","path":"\/uploads\/ae7f5b43-0d05-4d2f-9f69-298c258ea531.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/ae7f5b43-0d05-4d2f-9f69-298c258ea531.webp","mime_type":"image\/jpeg"},"url":"https:\/\/learn.eccouncil.org\/course\/e2ec4018-8923-4635-bb47-b87167258752","slug_url":"scrum-certification-scrum-master-agile-scrum-training","is_free":1,"price":"0","discount_price":"","reviews_count":526,"rate":4.8,"enrolled":false,"enrollment":1811,"completion_percentage":0,"is_finished":false,"has_access":false,"eccouncil_url":null,"lab_count":0,"chapter_count":8,"completed_certification":false},{"id":"8bbaba97-968a-42e5-b8c8-787842e2cfb1","name":"Scrum: A Concise Introduction","brief":"A concise overview of how to deliver projects on time and explode your team's productivity with the scrum framework","level":1,"timing":37,"category":{"id":"9ecd4108-b077-4880-b604-0bab4715dbbf","name":"Software Development","color_class":null,"category_icon_class_name":null,"image":null},"course_type":1,"image":{"id":"df2cc312-fde4-4c2d-9260-f736d91b3ade","path":"\/uploads\/02325183-bc10-4c9f-9357-6765e648fe3b.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/02325183-bc10-4c9f-9357-6765e648fe3b.webp","mime_type":"image\/jpeg"},"url":"https:\/\/learn.eccouncil.org\/course\/8bbaba97-968a-42e5-b8c8-787842e2cfb1","slug_url":"scrum-a-concise-introduction","is_free":1,"price":"0","discount_price":"0","reviews_count":348,"rate":4.9,"enrolled":false,"enrollment":810,"completion_percentage":0,"is_finished":false,"has_access":false,"eccouncil_url":null,"lab_count":0,"chapter_count":3,"completed_certification":false},{"id":"97a05609-0b23-4237-9265-8d5d3504fb6e","name":"Jira Agile Project Management + Jira Administration + Jira Agile","brief":"Overview of using Jira to set up your first project + how to use it for scrum agile project management","level":1,"timing":32,"category":{"id":"9ecd4108-b077-4880-b604-0bab4715dbbf","name":"Software Development","color_class":null,"category_icon_class_name":null,"image":null},"course_type":1,"image":{"id":"433be801-eac8-48e6-bbef-857ec24a0e17","path":"\/uploads\/cb11933a-4ce9-4e1d-b09a-234c3f5fe08c.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/cb11933a-4ce9-4e1d-b09a-234c3f5fe08c.webp","mime_type":"image\/jpeg"},"url":"https:\/\/learn.eccouncil.org\/course\/97a05609-0b23-4237-9265-8d5d3504fb6e","slug_url":"jira-agile-project-management-jira-administration-jira-agile","is_free":1,"price":"0","discount_price":"0","reviews_count":552,"rate":4.8,"enrolled":false,"enrollment":1209,"completion_percentage":0,"is_finished":false,"has_access":false,"eccouncil_url":null,"lab_count":0,"chapter_count":2,"completed_certification":false},{"id":"98184b81-46b8-4d8d-95cc-9c803f5d2701","name":"Kanban: A Concise Introduction","brief":"Introduction to kanban to visualize your workflow and make your team more efficient.","level":1,"timing":33,"category":{"id":"ef03ce05-8ba8-4a61-b938-85ec5957e2f5","name":"Industrial Security Controls","color_class":"#920EF6","category_icon_class_name":"","image":null},"course_type":1,"image":{"id":"66b2e426-ccff-4100-a396-a8330da2a5c4","path":"\/uploads\/97344d36-5258-4f58-bf6d-469e0dd0975f.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/97344d36-5258-4f58-bf6d-469e0dd0975f.webp","mime_type":"image\/jpeg"},"url":"https:\/\/learn.eccouncil.org\/course\/98184b81-46b8-4d8d-95cc-9c803f5d2701","slug_url":"kanban-a-concise-introduction","is_free":1,"price":"0","discount_price":"0","reviews_count":290,"rate":4.7,"enrolled":false,"enrollment":608,"completion_percentage":0,"is_finished":false,"has_access":false,"eccouncil_url":null,"lab_count":0,"chapter_count":4,"completed_certification":false},{"id":"04f9bd32-b393-4293-9aaf-c01541e36608","name":"Agile Product Management: A Concise Introduction","brief":"A concise overview of Agile product management","level":1,"timing":30,"category":{"id":"9ecd4108-b077-4880-b604-0bab4715dbbf","name":"Software Development","color_class":null,"category_icon_class_name":null,"image":null},"course_type":1,"image":{"id":"d42b0843-e985-4727-9a47-a17028bbb74f","path":"\/uploads\/58ed1eb9-39b6-4c83-94f3-f8cf5a6a6311.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/58ed1eb9-39b6-4c83-94f3-f8cf5a6a6311.webp","mime_type":"image\/jpeg"},"url":"https:\/\/learn.eccouncil.org\/course\/04f9bd32-b393-4293-9aaf-c01541e36608","slug_url":"agile-product-management-a-concise-introduction","is_free":1,"price":"0","discount_price":"0","reviews_count":385,"rate":4.9,"enrolled":false,"enrollment":919,"completion_percentage":0,"is_finished":false,"has_access":false,"eccouncil_url":null,"lab_count":0,"chapter_count":3,"completed_certification":false},{"id":"159e0527-472b-4ccb-b5af-da2d3eeaa691","name":"Agile: A Concise Introduction","brief":"A concise overview of Agile principles","level":1,"timing":36,"category":{"id":"9ecd4108-b077-4880-b604-0bab4715dbbf","name":"Software Development","color_class":null,"category_icon_class_name":null,"image":null},"course_type":1,"image":{"id":"c330d199-e649-450e-b9b2-e87975815d8a","path":"\/uploads\/4a4e396c-9e52-4e84-80e0-2dabc76c5c4e.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/4a4e396c-9e52-4e84-80e0-2dabc76c5c4e.webp","mime_type":"image\/jpeg"},"url":"https:\/\/learn.eccouncil.org\/course\/159e0527-472b-4ccb-b5af-da2d3eeaa691","slug_url":"agile-a-concise-introduction","is_free":1,"price":"0","discount_price":"0","reviews_count":296,"rate":4.7,"enrolled":false,"enrollment":795,"completion_percentage":0,"is_finished":false,"has_access":false,"eccouncil_url":null,"lab_count":0,"chapter_count":3,"completed_certification":false}],"filters":{"categories":[{"id":"fa04b4cc-cf5f-4aef-838a-1310203822bb","name":"Cybersecurity","color_class":"#920EF6","category_icon_class_name":"","image":null},{"id":"c38840bc-e0f6-4d72-9f8b-a99279f28a70","name":"Data Science","color_class":"#920EF6","category_icon_class_name":null,"image":null},{"id":"af898bea-9b55-4796-9861-cbcf2367f89c","name":"Cloud Security","color_class":"#920EF6","category_icon_class_name":"","image":null},{"id":"ef03ce05-8ba8-4a61-b938-85ec5957e2f5","name":"Industrial Security Controls","color_class":"#920EF6","category_icon_class_name":"","image":null},{"id":"ff932fce-fbdf-46ac-8b38-79c8f5ed7c69","name":"Vulnerability Assessment and Pentesting","color_class":"#920EF6","category_icon_class_name":"","image":null},{"id":"a0bfb52c-d760-4516-acd1-73bb3127148b","name":"Security Architecture and Operations","color_class":null,"category_icon_class_name":null,"image":null},{"id":"c4223df8-ccb5-4129-b727-1fac06479bdb","name":"Governance, Risk, and Compliance","color_class":"#920EF6","category_icon_class_name":"","image":null},{"id":"bb9bec74-477e-426c-a771-7e8ba1907b78","name":"DevSecOps","color_class":null,"category_icon_class_name":null,"image":null},{"id":"9ecd4108-b077-4880-b604-0bab4715dbbf","name":"Software Development","color_class":null,"category_icon_class_name":null,"image":null},{"id":"e53107a5-65b2-4af1-b98e-cf0db7182d4e","name":"Artificial Intelligence","color_class":"#C52C62","category_icon_class_name":null,"image":{"id":"6ab0d0d3-f73a-435f-b729-700d4b0b1727","path":"uploads\/MTaFTv7axiRlvyhUK3zptW45HGmuqbwLF1eguY0G.jpg","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/MTaFTv7axiRlvyhUK3zptW45HGmuqbwLF1eguY0G.jpg","mime_type":"image\/jpeg"}}],"levels":[{"id":1,"name":"Beginner","image":""},{"id":2,"name":"Intermediate","image":""},{"id":3,"name":"Advanced","image":""}],"job_role":[{"id":"074ba737-226d-4d45-ab77-dd7fc973f695","name":"Cyber Workforce Developer and Manager (OV-SPP-001)"},{"id":"1","name":"Exploitation Analyst"},{"id":"10","name":"Software Developer"},{"id":"11","name":"Communications Security (COMSEC) Manager"},{"id":"12","name":"Systems Developer"},{"id":"13","name":"Cyber Crime Investigator"},{"id":"14","name":"Cyber Policy and Strategy Planner"},{"id":"15","name":"Systems Security Analyst"},{"id":"16","name":"Cyber Defense Analyst"},{"id":"17","name":"Vulnerability Assessment Analyst"},{"id":"18","name":"Data Analyst"},{"id":"19","name":"Program Manager"},{"id":"2","name":"System Administrator"},{"id":"20","name":"Threat\/Warning Analyst"},{"id":"21","name":"Security Architect"},{"id":"22","name":"Database Administrator"},{"id":"23","name":"Secure Software Assessor"},{"id":"24","name":"System Testing and Evaluation Specialist"},{"id":"26","name":"IT Project Manager"},{"id":"27","name":"Executive Cyber Leadership"},{"id":"29","name":"Cyber Operator"},{"id":"3","name":"Information Systems Security Manager"},{"id":"30","name":"Security Control Assessor"},{"id":"31","name":"Authorizing Official\/Designating Representative"},{"id":"32","name":"Information Systems Security Developer"},{"id":"4","name":"Cyber Defense Incident Responder"},{"id":"4407ff1d-0a08-4bc9-a222-57143e797915","name":"Target Network Analyst (AN-TGT-002)"},{"id":"4effa058-a70a-4c86-a407-f558169eb4a7","name":"Cyber Defense Incident Responder (PR-CIR-001)"},{"id":"5","name":"Cyber Defense Forensics Analyst"},{"id":"6","name":"Network Operations Specialist"},{"id":"6ae6ab3b-78f1-43c4-a294-99dc4095f2c0","name":"Forensics Analyst (IN-FOR-001)"},{"id":"8","name":"Privacy Officer\/Privacy Compliance Manager"},{"id":"893ac72b-e367-4339-aaef-5381a4e24117","name":"Cyber Defense Analyst (PR-CDA-001)"},{"id":"9","name":"Enterprise Architect"},{"id":"abff2d68-0c26-4b4c-ab8e-e912dcdacc18","name":"Exploitation Analyst (AN-EXP-001)"},{"id":"c72d5dde-01fb-4491-8b1f-a516b4b4669a","name":"Security Architect (SP-ARC-002)"},{"id":"db222eb6-6491-4eee-b6f6-f299825b6d8d","name":"Vulnerability Assessment Analyst (PR-VAM-001)"}],"specialty_area":[{"id":"10","name":"Software Development (DEV)"},{"id":"11","name":"Exploitation Analysis (EXP), Cyber Operations (OPS)"},{"id":"12","name":"Systems Development (SYS)"},{"id":"13","name":"Cyber Investigation (INV)"},{"id":"14","name":"Strategic Planning and Policy (SPP)"},{"id":"15","name":"Systems Analysis (ANA)"},{"id":"16","name":"Cyber Defense Analysis (CDA)"},{"id":"17","name":"Vulnerability Assessment and Management (VAM)"},{"id":"18","name":"Data Administration (DTA)"},{"id":"19","name":"Program\/Project Management (PMA) and Acquisition"},{"id":"2","name":"Exploitation Analysis (EXP)"},{"id":"20","name":"Threat Analysis (TWA)"},{"id":"21","name":"Vulnerability Assessment and Management (VAM)"},{"id":"22","name":"Test and Evaluation (TST)"},{"id":"25","name":"Executive Cyber Leadership (EXL)"},{"id":"26","name":"Cyber Operations (OPS)"},{"id":"27","name":"Risk Management (RSK)"},{"id":"3","name":"Systems Administration (ADM)"},{"id":"4","name":"Cybersecurity Management (MGT)"},{"id":"5","name":"Incident Response (CIR)"},{"id":"6","name":"Digital Forensics (FOR)"},{"id":"7","name":"Network Services (NET)"},{"id":"8","name":"Legal Advice and Advocacy (LGA)"},{"id":"9","name":"Systems Architecture (ARC)"}]},"skill_learnPaths":{"data":[{"id":"03b7d6cd-5bff-4d97-abc6-b72f36ca202c","name":"Mastering Digital Forensics","slug_url":"mastering-digital-forensics-learning-path","description":["Detect and backtrack cyber criminals and hackers with digital forensics"],"features":["Administer and support Linux in your environment","Manage and automate GNU open-source tools","Learn how to produce professional and legal digital forensic reports","Learn the aspects of digital forensics"],"type":2,"timing":"15 hrs","courses_count":3,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"c25a0f8b-4c14-4d7e-9915-256bf288e658","path":"uploads\/2f7516d8-b26e-4dbb-a140-cadc9d8d50c7.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/2f7516d8-b26e-4dbb-a140-cadc9d8d50c7.webp","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":3,"number_of_chapters":24},{"id":"066b41de-c0aa-4648-a2ea-995cac38afcb","name":"Conducting Reconnaissance for Cybersecurity","slug_url":"conducting-reconnaissance-for-cybersecurity-learning-path","description":["Build the skills to identify, map, and assess digital assets before attackers do."],"features":["Get hands-on experience that you can immediately use elsewhere","Use Open-Source Intelligence techniques on Google and LinkedIn","Get a solid understanding of how databases work in modern applications","Learn how to prevent common database attacks and misconfigurations"],"type":2,"timing":"12 hrs","courses_count":2,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"9f85ef2d-ca8c-4595-962d-fbdbf90e51c4","path":"uploads\/YymfMddtuLiH0SyLaMACGodzBXjrtxewRpgfKL5f.jpg","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/YymfMddtuLiH0SyLaMACGodzBXjrtxewRpgfKL5f.jpg","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":10,"number_of_chapters":16},{"id":"07199e77-9e24-408a-b7eb-af43ee91f2b7","name":"Mastering DevSecOps in Cloud","slug_url":"Mastering-DevSecOps-in-Cloud","description":["Learn to Deploy, Test and Automate Cloud Infrastructure and Applications"],"features":["Understand how various technologies work together in DevOps","Develop and deploy applications in Microsoft Azure Cloud Platform","Get a firm understanding of the terminologies and concepts in the AWS platform"],"type":2,"timing":"69 hrs","courses_count":14,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"a852c0cd-8dae-4907-a4fa-973eae565ef0","path":"\/uploads\/29564733-46d8-4178-8ac5-cac39fe611ca.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/29564733-46d8-4178-8ac5-cac39fe611ca.webp","mime_type":"image\/jpeg"},"category":"Secure Programming","number_of_labs":6,"number_of_chapters":93},{"id":"0802bb77-45e9-4ea4-82cf-d3a8d361a1d3","name":"Cybersecurity Unleashed for Banks","slug_url":"cybersecurity-unleashed-for-banks","description":["Secure Banking Infrastructure with AI-Driven Cyber Defense, Zero Trust Security, and Advanced Threat Mitigation Strategies."],"features":["Practical applications of cybersecurity tools in the banking sector.","In-depth coverage of incident response and compliance.","Specialized training on AI-powered cybersecurity techniques."],"type":2,"timing":"75 hrs","courses_count":19,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"9553dac5-ddec-440c-a424-09555ece82c1","path":"uploads\/dd472a3e-5855-44a3-a69b-dc89ae405ddc.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/dd472a3e-5855-44a3-a69b-dc89ae405ddc.webp","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":30,"number_of_chapters":180},{"id":"08deb204-c6bf-410a-a975-a0311b2e7965","name":"Gateway to Programming Fundamentals","slug_url":"Gateway-to-Programming-Fundamentals","description":["Become a High-level Programmer Equipped with Secure Software Development Skills in C, C++, Java, and Python"],"features":["Get to know about NumPy and Visualization","Understand what is SciPy, a free, open source Python library","Explore 3D Visualization in detail"],"type":2,"timing":"43 hrs","courses_count":5,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"0e6eaf89-4a06-4810-8511-ad0a13e1d0d6","path":"\/uploads\/1426fdf2-6f94-4597-b416-de53a592170c.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/1426fdf2-6f94-4597-b416-de53a592170c.webp","mime_type":"image\/jpeg"},"category":"Secure Programming","number_of_labs":0,"number_of_chapters":42},{"id":"0e53452d-5f8a-44b0-8afe-be9ae330ab82","name":"CVEs Detection and Mitigation","slug_url":"cves-detection-and-mitigation","description":["Learn to detect, exploit, and mitigate critical CVEs, focusing on real-world ethical hacking, bug bounties, and penetration testing techniques."],"features":["Practical exploitation and mitigation of critical CVEs.","In-depth bug bounty and penetration testing techniques.","Hands-on labs focused on Oracle WebLogic security.","Real-world scenarios to enhance vulnerability detection skills."],"type":2,"timing":"37 hrs","courses_count":7,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"6e25a04b-17ae-4d8a-abbc-2384822eb0f2","path":"\/uploads\/326acb90-ce64-4644-b384-62180a8aeaea.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/326acb90-ce64-4644-b384-62180a8aeaea.webp","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":11,"number_of_chapters":57},{"id":"11d68211-9a43-4c95-a65a-1003404aeb1c","name":"Integrating Security into IoT","slug_url":"integrating-security-into-IoT","description":["Learn about the various cyber-threats that revolve around the IoT and smart city world, and how to defend against them."],"features":["More the 90 detailed videos explain how to use Raspberry Pi for Penetration Testing.","Start with simple projects and gradually build up to more advanced projects","Real-world example scenarios to make concepts it more tangible.","Coverage of all the various protocols, standards, and systems used in smart cities"],"type":2,"timing":"28 hrs","courses_count":6,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"db8e5fec-ff7b-477b-96e3-c6dd4518cc33","path":"uploads\/4cd1cb20-0c79-4116-bdbb-ad2a53c4710a.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/4cd1cb20-0c79-4116-bdbb-ad2a53c4710a.webp","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":0,"number_of_chapters":59},{"id":"1203d15c-ce80-4aea-819f-625d5e712684","name":"Unleash Microsoft Security CERT Preps","slug_url":"unleash-microsoft-security-cert-preps","description":["Fulfil your career ambitions in Microsoft security with end-to-end training in all Microsoft cybersecurity tools and services."],"features":["You'll understand the Risk Mindset needed to protect the business.","You'll learn how to install, configure and manage Microsoft Server 2019.","You'll learn to use solutions within Office 365 to detect, protect, and remediate these risks.","You will go through several threats and attack techniques and the tools provided by Microsoft.","You'll gain the knowledge and skills needed to pass the Exam SC-900."],"type":2,"timing":"34 hrs","courses_count":7,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"40b438e6-e8c3-41d0-b1db-f480c1cbd38b","path":"\/uploads\/763318d6-32b7-45a7-a423-c813d2d32846.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/763318d6-32b7-45a7-a423-c813d2d32846.webp","mime_type":"image\/jpeg"},"category":"Cloud Computing","number_of_labs":0,"number_of_chapters":45},{"id":"13267929-9f01-4b98-9457-7b5852243645","name":"Protecting Data in Microsoft Azure","slug_url":"protecting-data-in-microsoft-azure-learning-path","description":["What is Microsoft Azure Security Center, how does it work, and why is it important for modern businesses?"],"features":["You'll also learn about authentication and authorization","You'll learn how to determine the workload requirements","ou'll explore how to monitor for identity and security","You'll learn how to design a Data Management, Data Protection, and Site Recovery Strategy"],"type":2,"timing":"34 hrs","courses_count":4,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"4c295d08-08af-4915-82c7-cc3fba46f1f4","path":"uploads\/e502cb96-3d59-4b69-acee-abeb9f10a2f3.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/e502cb96-3d59-4b69-acee-abeb9f10a2f3.webp","mime_type":"image\/jpeg"},"category":"Cloud Computing","number_of_labs":0,"number_of_chapters":34},{"id":"16585947-fb8c-4617-bb01-a6d4fbbc99b6","name":"Building Secure Java Applications","slug_url":"Building-Secure-Java-Applications-learning-path","description":["Learn security coding practices and defensive measures needed to design and build a secure Java application."],"features":["Learn to identify common vulnerabilities in Java code","Learn to build your own to Java Enterprise application","Learn to confidently apply the security features available in Java EE.","Gain a broad overview of OOP, from beginner to expert","Learn to build applications and RESTFUL APIs using Spring and Spring Boot works"],"type":2,"timing":"33 hrs","courses_count":6,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"2005fe0c-ccde-4ec4-ae09-8a05bf1529cc","path":"\/uploads\/8881b064-ca8b-403d-9042-319d1d27d2c8.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/8881b064-ca8b-403d-9042-319d1d27d2c8.webp","mime_type":"image\/jpeg"},"category":"Secure Programming","number_of_labs":0,"number_of_chapters":44},{"id":"219e6c6e-a68d-4c12-b2fc-e461aa9245d3","name":"Adopting Security and Privacy in Data","slug_url":"adopting-security-and-privacy-data","description":["Learn Data Security and Privacy with Real World Examples by Mastering CCPA, and GDPR Compliance"],"features":["Explanation of data privacy concepts, GDPR foundations","Understand what GDPR compliance means","Understand the impact of GDPR on Security Incident Response","Learn how to draft a Security Incident Response program"],"type":2,"timing":"35 hrs","courses_count":5,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"10909047-0c2b-48e6-918e-38bb8b7538ce","path":"uploads\/a2367a5e-ca27-40fd-b5b9-27de17ef4bce.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/a2367a5e-ca27-40fd-b5b9-27de17ef4bce.webp","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":0,"number_of_chapters":42},{"id":"22c602a3-f1d6-480f-83e9-d482a3bb34f6","name":"Web Security for Cybersecurity Engineers","slug_url":"web-security-for-cybersecurity-engineers","description":["Master enterprise web security, application security, and container security with hands-on training and real-world scenarios."],"features":["In-depth coverage of enterprise web security.","Advanced container and Kubernetes security training.","Integration of security into the SDLC and DevSecOps."],"type":2,"timing":"24 hrs","courses_count":5,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"138a62b2-233b-497d-9863-e481be7d2f7b","path":"uploads\/0e632f66-a685-43e1-913e-c8e44e19af77.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/0e632f66-a685-43e1-913e-c8e44e19af77.webp","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":21,"number_of_chapters":54},{"id":"233121fa-c6d2-4c9e-9d27-73e961cf65f0","name":"Defending Against Cyber Bullying","slug_url":"defending-against-cyber-bullying-learning-path","description":["What it is, its effects, and best practices to prevent it"],"features":["Learn about cyberbullying, types of cyberbullying, and how and why it happens","Understand the impacts of cyberbullying, and why it is so dangerous","Learn how to identify cyberbullying, and avoid and protect yourself from bullies","Learn the strategies to protecting your online personal information"],"type":2,"timing":"9 hrs","courses_count":3,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"91d52578-a6e1-45db-b82c-53d8d99e08a8","path":"uploads\/88acceef-8988-4828-a559-9b42b00f2c32.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/88acceef-8988-4828-a559-9b42b00f2c32.webp","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":0,"number_of_chapters":18},{"id":"2a3aac92-0969-4b09-b398-d021c006272a","name":"Programming for Ethical Hackers","slug_url":"Programming-for-Ethical-Hackers","description":["Gain expertise in one of the most underrated but useful skill in ethical hacking."],"features":["Learn about the basics of C, C++ and Java programming languages.","Introduction to identifying common vulnerabilities in Java, C and C++ code.","Write Python scripts to automate large-scale network attacks and investigate forensic artifacts.","How to test Ruby on Rails applications using static code analysers such as Brakeman.","Enhance and broaden your technical skills in Linux by learning shell scripting with Bash.","Learning fundamental Z shell utilities\/commands that are critical for every Linux user to know","You'll learn about Jq Basics.","You'll gain knowledge on secure software lifecycle."],"type":2,"timing":"63 hrs","courses_count":10,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"362deaf1-3541-4ab6-ba41-2517182dafba","path":"\/uploads\/0b475833-d29d-4477-b413-9705cd3e9d3e.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/0b475833-d29d-4477-b413-9705cd3e9d3e.webp","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":13,"number_of_chapters":93},{"id":"2d38998a-047d-4802-9557-975a2c9717d2","name":"Unleash JavaScript","slug_url":"unleash-javascript","description":["Unleash the power of JavaScript and get started with your Web Development career today"],"features":["A-Z coverage of JavaScript, HTML5 and CSS basics","Fun and interactive courses with a ton of practical elements to it","Learn Asynchronous JavaScript concept in detail with real-world examples","Extensive and practical coverage on Object Oriented Programming"],"type":2,"timing":"40 hrs","courses_count":6,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"65aa096b-f782-46c3-bdcd-61299b1bbeef","path":"uploads\/vZkvPcj0tL8A7DgT0mrfFMuv1R7RxHcEhVGWd1c5.jpg","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/vZkvPcj0tL8A7DgT0mrfFMuv1R7RxHcEhVGWd1c5.jpg","mime_type":"image\/jpeg"},"category":"Secure Programming","number_of_labs":0,"number_of_chapters":26},{"id":"32b0491f-f3f9-4138-9484-cc7f1338f2db","name":"Mastering Ethical Hacking Tools","slug_url":"Mastering-Ethical-Hacking-Tools-skill-path","description":["Gain hands-on mastery of essential ethical hacking tools used in real-world penetration testing and threat analysis."],"features":["Tool-focused hands-on labs and walkthroughs.","Real-world attack simulations and countermeasures.","Diverse coverage: networks, systems, apps, and IoT.","Practical experience with both offensive and defensive tools."],"type":2,"timing":"42 hrs","courses_count":10,"type_name":"Skill Path","completion_percentage":0,"image":{"id":"9c964138-5349-4c47-9e4a-ec0f78867310","path":"uploads\/2115988c-8415-4879-a026-4f95c470010f.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/2115988c-8415-4879-a026-4f95c470010f.webp","mime_type":"image\/jpeg"},"category":"Secure Programming","number_of_labs":46,"number_of_chapters":72}],"pagination":{"total":50,"count":16,"per_page":16,"current_page":1,"total_pages":4}},"career_learnPaths":{"data":[{"id":"0ea40e73-085e-4d1c-b99a-7a07ab53d8fe","name":"Building Security Operation Centre from Scratch for SOC Specialists","slug_url":"building-security-operation-centre-from-scratch-for-soc-specialists","description":["Learn to build, deploy, and manage a complete SOC infrastructure with real-world tools, techniques, and automation."],"features":["End-to-end SOC lifecycle training from planning to automation.","Coverage of both on-premise and cloud data sources.","Integration of AI, ML, and OSINT in SOC operations."],"type":1,"timing":"23 hrs","courses_count":5,"type_name":"Career Path","completion_percentage":0,"image":{"id":"8094f506-0519-45e7-bed7-b295c9750223","path":"uploads\/f0913209-d496-4b12-bc7a-aac5663377df.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/f0913209-d496-4b12-bc7a-aac5663377df.webp","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":1,"number_of_chapters":38},{"id":"1e5003bd-8adb-4494-a4eb-054abfd9605b","name":"Becoming a DevOps Professional","slug_url":"becoming-a-devops-professional","description":["Begin DevOps Career as an Absolute Beginner | Linux, AWS, Scripting, Jenkins, Ansible, Azure, Docker, K8s, N-Tier Projects"],"features":["Understand how various technologies work together in DevOps","Get a firm understanding in DevOps Processes, Tools & Technologies","Learn to deploy infrastructure on Azure DevOps using automated pipeline"],"type":1,"timing":"84 hrs","courses_count":5,"type_name":"Career Path","completion_percentage":0,"image":{"id":"dd492ea5-5c2a-4280-b401-062f1d482485","path":"uploads\/b8cbMbUEo7H1r3VXtTJ6tAqlK8HixDhPSrV2uz5h.jpg","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/b8cbMbUEo7H1r3VXtTJ6tAqlK8HixDhPSrV2uz5h.jpg","mime_type":"image\/jpeg"},"category":"Secure Programming","number_of_labs":0,"number_of_chapters":53},{"id":"2cfe9b7e-26c2-4e1d-bd0e-06d6aaf9f8cb","name":"Mastering Exploitation Analysis","slug_url":"mastering-exploitation-analysis","description":["Master the skills required to analyze, exploit, and secure systems with hands-on cybersecurity training."],"features":["Real-world case studies and practical exploitation exercises","Industry-relevant certifications and security frameworks","Guided learning with expert-led training modules"],"type":1,"timing":"36 hrs","courses_count":9,"type_name":"Career Path","completion_percentage":0,"image":{"id":"70edc053-061d-45d1-9fb8-e63cd6b1b712","path":"uploads\/f0a0fa32-86eb-4563-956e-dcf7b5525bab.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/f0a0fa32-86eb-4563-956e-dcf7b5525bab.webp","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":29,"number_of_chapters":58},{"id":"351eb8c3-7e98-4d4b-acb1-814f96997e65","name":"Becoming a Digital Imaging Professional","slug_url":"Becoming-a-Digital-Imaging-Professional","description":["Become a Digital Imaging Professional Without Spending a Fortune on Your Training!"],"features":["Learn to create, insert, update, filter, and delete records, tables, and databases in SQL","Advanced SQL syntax like Grouping, Subqueries and Aggregate Functions to extract new features","Perform small SQL exercise after each section to practice SQL queries"],"type":1,"timing":"50 hrs","courses_count":5,"type_name":"Career Path","completion_percentage":0,"image":{"id":"cbeaf87e-ed18-4de5-8b69-4a73b29a3a31","path":"\/uploads\/b7199207-02ab-4575-9642-fd9459d2e066.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/b7199207-02ab-4575-9642-fd9459d2e066.webp","mime_type":"image\/jpeg"},"category":"Artificial Intelligence","number_of_labs":0,"number_of_chapters":31},{"id":"3b849ab8-ea76-4e81-85fb-b5e8a6b3cb6a","name":"Becoming a Network Security Engineer","slug_url":"becoming-a-network-security-engineer","description":["Master the basics of networking and become the most desired network security professional"],"features":["Gain a clear understanding of networking technologies and concepts","Hands-on demonstration of how to install and configure Windows Server 2019","Thorough explanation on how to deploy and manage Containers","Practical illustration of how to use Cisco technologies"],"type":1,"timing":"32 hrs","courses_count":4,"type_name":"Career Path","completion_percentage":0,"image":{"id":"fe8167b4-fae8-4efc-9a25-1d8c751bd315","path":"uploads\/oE1F5ahA8VqcAcuvmtPu3EmL7h9LaZDyy5alKhz2.jpg","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/oE1F5ahA8VqcAcuvmtPu3EmL7h9LaZDyy5alKhz2.jpg","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":0,"number_of_chapters":31},{"id":"484e4db7-af7f-41f5-bc0a-9e92657e7a30","name":"Becoming a Secure Cyber Professional","slug_url":"becoming-a-cyber-professional","description":["Build a strong foundation in cybersecurity and develop practical skills to begin a secure, high-growth tech career."],"features":["Beginner-friendly explanations with real-world examples","Step-by-step progression from basics to job awareness"],"type":1,"timing":"25 hrs","courses_count":5,"type_name":"Career Path","completion_percentage":0,"image":{"id":"65d41f47-93ca-477a-9224-2d4d192f97cf","path":"uploads\/C6LiVUIssoiH8PJpm9gbP5ingu6auFhEVTeluq1H.jpg","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/C6LiVUIssoiH8PJpm9gbP5ingu6auFhEVTeluq1H.jpg","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":0,"number_of_chapters":58},{"id":"4cb4ccc2-28fc-4557-8ac9-f90017696fa1","name":"Becoming a Network Management and Security Specialist","slug_url":"Network-Management-and-Security-Specialist","description":["Becoming a Network Management and Security Specialist Without Spending a Fortune on Your Training!"],"features":["You\u2019ll learn to use Zeek to monitor and analyze network traffic","You\u2019ll learn to analyze and filter network traffic using Wireshark","You\u2019ll learn to use Python scripts to automate routine network tasks"],"type":1,"timing":"41 hrs","courses_count":7,"type_name":"Career Path","completion_percentage":0,"image":{"id":"388288f4-af2a-43d1-b576-c67278c753ab","path":"\/uploads\/d6adb1c8-a08d-4693-901c-1205f1b72c22.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/d6adb1c8-a08d-4693-901c-1205f1b72c22.webp","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":17,"number_of_chapters":49},{"id":"571156fe-6fa4-4948-87ae-8ce3b6c70313","name":"Becoming an Information Security Specialist","slug_url":"Becoming-an-Information-Security-Specialist","description":["Become a Information Security Specialist Without Spending a Fortune on Your Training!"],"features":["Enhance your Risk Management knowledge and expertise.","Learn the importance of protecting sensitive data.","Learn about the important aspects of the NIST Framework."],"type":1,"timing":"81 hrs","courses_count":19,"type_name":"Career Path","completion_percentage":0,"image":{"id":"2ffcf686-dd91-4cbe-b712-a15cf8a3f165","path":"\/uploads\/338b4351-85fd-426a-ba21-6821ae8a9614.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/338b4351-85fd-426a-ba21-6821ae8a9614.webp","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":0,"number_of_chapters":119},{"id":"7b5bb034-5478-4f7a-9561-9ac8c447a1ce","name":"Information Security Specialist: Novice to Pro","slug_url":"information-security-specialist-novice-to-pro-learning-path","description":["Become a Information Security Specialist Without Spending a Fortune on Your Training!"],"features":["Develop understanding of Data Protection\/Data Privacy and the EU GDPR","Learn what qualifications and skills you need to become a Chief Information Security Officer (CISO).","Learn the best practice standards, processes, policies and systems to improve information security"],"type":1,"timing":"25 hrs","courses_count":7,"type_name":"Career Path","completion_percentage":0,"image":{"id":"964d53b3-c849-4b5f-8cbd-123ecf4f9fb9","path":"\/uploads\/177a79a7-9c70-4785-a291-abd368027b95.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/177a79a7-9c70-4785-a291-abd368027b95.webp","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":0,"number_of_chapters":45},{"id":"9e3c5a43-efbf-4369-b2ca-f25b95fbf3b8","name":"Become a Full Stack Developer","slug_url":"Become-a-Full-Stack-Developer","description":["Become a Full Stack Developer Without Spending a Fortune on Your Training!"],"features":["Publish your project versions so that they\u2019re trackable and reproducible","Learn about Docker and its benefit over Virtual Machine","Learn about the architecture of Docker"],"type":1,"timing":"60 hrs","courses_count":6,"type_name":"Career Path","completion_percentage":0,"image":{"id":"cf0d55f3-559f-4dd6-9da6-4078b5839c3a","path":"\/uploads\/ffb626f8-464e-4204-8deb-45e239be06fc.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/ffb626f8-464e-4204-8deb-45e239be06fc.webp","mime_type":"image\/jpeg"},"category":"Secure Programming","number_of_labs":0,"number_of_chapters":40},{"id":"af14de41-e7fc-4bca-a392-7a4660c5e8f1","name":"Endpoint Security Professional","slug_url":"Endpoint-Security-Professional","description":["Become an Endpoint Security Professional Without Spending a Fortune on Your Training!"],"features":["Fundamentals of Identity and Access Management","Basic understanding of networking concepts, network files and commands","Frameworks and industry standards for hunting"],"type":1,"timing":"39 hrs","courses_count":7,"type_name":"Career Path","completion_percentage":0,"image":{"id":"2a434d7d-fa25-4b99-8e54-86b72e835430","path":"\/uploads\/3ec1364b-bdac-44dc-8e36-3768e35e54e5.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/3ec1364b-bdac-44dc-8e36-3768e35e54e5.webp","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":11,"number_of_chapters":36},{"id":"b1d22c3a-8390-4b0a-82bb-2e7ef9d497bf","name":"Becoming a Data Analyst","slug_url":"becoming-a-data-analyst-learning-path","description":["Learn top data analysis tools and become the indispensable Data Analyst"],"features":["Real time use cases to see how applied data mining helps to draw different insights","Develop the data visualization skills by learning Tableau\u2019s key concepts","Get comfortable with the Python data analysis stack","Real-time use cases on use of Python for performing applied statistics"],"type":1,"timing":"22 hrs","courses_count":7,"type_name":"Career Path","completion_percentage":0,"image":{"id":"f28f4a12-7c6d-4034-8f37-4ef6ac69c584","path":"uploads\/99a1dc43-5584-4cbb-9c04-fde84940d9fd.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/99a1dc43-5584-4cbb-9c04-fde84940d9fd.webp","mime_type":"image\/jpeg"},"category":"Data Science & AI","number_of_labs":0,"number_of_chapters":30},{"id":"b3fb0354-ab79-4675-95e0-dca218210aef","name":"Becoming a GIS Analyst","slug_url":"Becoming-a-GIS-Analyst","description":["Become a GIS Analyst Without Spending a Fortune on Your Training!"],"features":["Learn to create, insert, update, filter, and delete records, tables, and databases in SQL","Discover how to construct a Dataframe.","Learn how to connect to SQLite databases and perform operations.","Learn advanced SQL syntax to extract new features","Perform small SQL exercise after each section to practice SQL queries"],"type":1,"timing":"34 hrs","courses_count":6,"type_name":"Career Path","completion_percentage":0,"image":{"id":"bba23cf0-9570-49aa-97f3-9a5ba8ed68a8","path":"\/uploads\/ff1caad9-69cc-4416-a08b-51781ed48a1c.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/ff1caad9-69cc-4416-a08b-51781ed48a1c.webp","mime_type":"image\/jpeg"},"category":"Secure Programming","number_of_labs":0,"number_of_chapters":38},{"id":"b47d2e63-fb6e-40f9-b8eb-3e289dc85a95","name":"Pentesting Agent - Beginner","slug_url":"pentesting-agent-beginner","description":["Launch your journey into ethical hacking and penetration testing with hands-on, real-world tools."],"features":["Tool-driven, lab-focused learning with real scenarios","Progressive path from fundamentals to applied testing"],"type":1,"timing":"29 hrs","courses_count":5,"type_name":"Career Path","completion_percentage":0,"image":{"id":"8e783e95-fc98-48e8-b3c2-4fe504f6e362","path":"uploads\/fvGFYi13Azjs4hD5hZueEP0jHdtdJ9QuyylF9Fuh.jpg","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/fvGFYi13Azjs4hD5hZueEP0jHdtdJ9QuyylF9Fuh.jpg","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":22,"number_of_chapters":32},{"id":"baf7e3a9-9dbb-48b3-a81d-447a86a601b2","name":"Pentesting Agent - Intermediate","slug_url":"pentesting-agent-intermediate","description":["Build hands-on skills to identify, exploit, analyze, and secure real-world enterprise systems."],"features":["Perform Vulnerability Assessments","Perform Server side and Client-Side Attacks.","Learn Major tools and Techniques for web security.","Troubleshoot network issues.","Learn to detect all sorts of attacks.","Enhance and broaden your technical skills with Linux.","Learn how to become a Power User of the Operating System that runs the Internet."],"type":1,"timing":"37 hrs","courses_count":5,"type_name":"Career Path","completion_percentage":0,"image":{"id":"8ba2d504-0263-43de-969e-03750153e701","path":"uploads\/KyYM3daS2wHk2uEVKe9y6z4IzBxvCjwE1bImzGoi.jpg","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/KyYM3daS2wHk2uEVKe9y6z4IzBxvCjwE1bImzGoi.jpg","mime_type":"image\/jpeg"},"category":"Information Security","number_of_labs":22,"number_of_chapters":48},{"id":"c0307960-ef88-461b-aff4-27b933e6df82","name":"Becoming a Data Engineer","slug_url":"Becoming-a-DataEngineer-learning-path","description":["Become a Data Engineer Without Spending a Fortune on Your Training!"],"features":["You\u2019ll learn to build and manipulate Databases with Python and SQL","You\u2019ll learn how to build a production ready data pipeline using Azure Data Factory","You\u2019ll implement data warehousing use cases","You\u2019ll design and build a data warehouse using Amazon Redshift","You\u2019ll understand Machine learning core concepts and End-to-end Machine learning workflow","You\u2019ll build, train and evaluate ML models using Python"],"type":1,"timing":"39 hrs","courses_count":11,"type_name":"Career Path","completion_percentage":0,"image":{"id":"1bfa5f7e-e9bc-49f6-8747-9b533e5dab24","path":"\/uploads\/89d951b3-03b8-4a33-bc6a-a4043696e7bd.webp","full_url":"https:\/\/eccommonstorage.blob.core.windows.net\/codered\/uploads\/89d951b3-03b8-4a33-bc6a-a4043696e7bd.webp","mime_type":"image\/jpeg"},"category":"Data Science & AI","number_of_labs":0,"number_of_chapters":57}],"pagination":{"total":23,"count":16,"per_page":16,"current_page":1,"total_pages":2}}}}