Security+ registration has begun, 20% discount until 3/15.

Tel: +1 (240) 863-2817

VICTRICS, LLC

Tel: +1 (240) 863-2817

VICTRICS, LLC
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • FAQ
  • Schedule
  • Price Lists
  • Training Registration
  • Credit Card Payments
  • Downloads (Sign in)
  • Podcasts

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

Cyber Security Training at Victrics

PowerPoint slides and template downloads for the cyber security course, including resources for ISSO training and materials for security controls assessor preparation.

Analyzing-Network-Based-Indicators-of-Malicious-Activity (pdf)Download
Hardening-Operating-Systems (pdf)Download
Linux-Part2-Understanding-Linux-Permissions-and-File-System-Hardening (pdf)Download
Mapping-the-Digital-World-Inside-Network-Addressing (pdf)Download
Security-Baselines-and-Compliance-Controls (pdf)Download
Overview-of-Cryptography (pdf)Download
Understanding-DNS-Tunneling (pdf)Download
Understanding-SQL-A-Comprehensive-Overview (pdf)Download
Understanding-Teardrop-Attacks-IP-Fragmentation-Vulnerabilities (pdf)Download
Understanding-Windows-Forensics-Key-Concepts-and-Tools (pdf)Download

Copyright © 2026 Victrics, LLC - All Rights Reserved.

Powered by

  • Downloads (Sign in)
  • Privacy Policy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept