Security+ registration has begun, 20% discount until 3/15.

Tel: +1 (240) 863-2817

VICTRICS, LLC

Tel: +1 (240) 863-2817

VICTRICS, LLC
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • FAQ
  • Schedule
  • Price Lists
  • Training Registration
  • Credit Card Payments
  • Downloads (Sign in)
  • Podcasts

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

Cyber Security Training at Victrics

Download slide presentations in PDF format related to the cyber security course, including materials for ISSO training and guidance for the security controls assessor.

Analyzing-Network-Based-Indicators-of-Malicious-Activity (pdf)Download
Cyber-Essentials-Mastering-Network-Device-Fundamentals (pdf)Download
Designing-Your-Security-Operations-Center-SOC (pdf)Download
Hardening-Operating-Systems (pdf)Download
Insider-Threat-Mitigation-Strategies (pdf)Download
IT-Incident-Response-Playbook (pdf)Download
Linux-User-and-Group-Management (pdf)Download
Linux-Part2-Understanding-Linux-Permissions-and-File-System-Hardening (pdf)Download
Malware-Understanding-the-Digital-Threat-Landscape (pdf)Download
Mapping-the-Digital-World-Inside-Network-Addressing (pdf)Download
Mastering-Splunk-for-Cybersecurity-A-Comprehensive-Overview (pdf)Download
MITRE-ATTandCK-Enterprise-Techniques-for-Windows (pdf)Download
Network-Access-Control-Overview (pdf)Download
NIST-vs-ISO-27001-Comprehensive-Framework-Analysis-and-Control-Mappings (pdf)Download
Overview-of-Cryptography (pdf)Download

Copyright © 2026 Victrics, LLC - All Rights Reserved.

Powered by

  • Downloads (Sign in)
  • Privacy Policy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept