Short CourseIndustrial Security Controls
Short Course

DIY Bluetooth Phone Controlled BB-8 Droid with Arduino

DIY Bluetooth Phone Controlled BB-8 Droid with Arduino

Industrial Security Controls

iconBeginner

icon5( 134 Reviews )

icon 1 hr 3 mins

Industrial Security Controls

iconBeginner
icon5(134 Reviews)
icon1 hr 3 mins Hrs
This BB-8 Model can be Controlled with a Smartphone using Application

This BB-8 Model can be Controlled with a Smartphone using Application

icon23 Premium Lessons
icon4 Quizzes & Assessments
iconCertificate of Completion

Create Your Free Account

Get immediate access to 25+ free cybersecurity and IT courses!

OR

Reviews

5

134 reviews

Average Course Rating

5 stars

70%

4 stars

28%

3 stars

1%

2 stars

0%

1 stars

1%

Related Courses

Short Course

CCNA - Understanding Routers and Switches

CCNA - Understanding Routers and Switches

Security Architecture and Operations

A comprehensive guide to understanding the in-depth functioning of routers and switches for the preparation of CCNA Exam.

iconIntermediate
icon2 hr
icon4.4

Short Course

SOC Lab: Threat Hunting com Wazuh + Grafana - Portuguese

SOC Lab: Threat Hunting com Wazuh + Grafana - Portuguese

Vulnerability Assessment and Pentesting

Threat Hunting Mastery: Integrando Wazuh e Fortalecendo a Segurança em Windows e Linux

iconIntermediate
icon14 hrs
icon4.5

Short Course

CISSP Certification Domains 5, 6, 7, and 8 Video Training

CISSP Certification Domains 5, 6, 7, and 8 Video Training

Cybersecurity

This course is ideal for individuals who desire to pass the Information Systems Security Professional CISSP Certification Exam and want to gain more insight and knowledge around IT, Information, and Cyber Security from a management/senior leader perspective.

iconIntermediate
icon7 hrs
icon4.5

Short Course

Curso Completo de Hacking Ético y Pentest con Metasploit - Spanish

Curso Completo de Hacking Ético y Pentest con Metasploit - Spanish

Cybersecurity

Domina Metasploit y técnicas de hacking ético: vulnerabilidades, explotación y creacion de malware ¡Desde 0 a experto!

iconAdvanced
icon16 hrs
icon3.8