Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- Cysa+ | Introduction to CYSA+ | 17th April (50:58)
- CYSA+ | Introduction to SOC | 24th April (67:45)
- CYSA | Responsibilities of SOC | 25th April (57:03)
- CYSA | Intro to Threat Intelligence | 26th April (60:41)
- CYSA | Threat intelligence lifecycle | 27th April (71:09)
- CYSA | Working with Siemplify SOAR | 27th April (53:41)
- CYSA | Phases of Threat Intelligence Lifecycle | 1st May (74:40)
- CYSA | Pyramid of Pain | 2nd May (60:42)
- CYSA | Threat Hunting | 3rd May (65:50)
- Cysa | Threat Hunting labs | 4th May (93:12)
- CYSA | IOCs in Mandiant | 5th May (59:34)
- CYSA | Network Threat Hunting | 8th May (80:22)
- CYSA | Network Threat Hunting (continued) | 9th May (57:09)
- CYSA | Doubts related session | 10th May (96:59)
- CYSA | Network Threat hunting lab 2 | 11th May (90:31)
- CYSA | 1Finishing Network Threat Hunting | 2th May (83:50)
- CYSA | Assembly Language | 15th May (68:59)
- CYSA | Concepts of Assembly Language | 16th May (55:22)
- CYSA | Assembly Language Basic Blocks | 17th May (64:10)
- CYSA | Multiplication And Division in Assembly | 18th May (64:02)
- CYSA | Lab on comparison | 19th May (65:28)
- CYSA | Installing Flare VM | 22nd May (71:22)
- CYSA | 23rd May (73:11)
- CYSA | Disassembler | 24th May (46:05)
- CYSA | Reverse engineering using Ghidra | 25th May (58:20)
- CYSA | Malware Analysis Lab Setup | 30th May (64:58)
- CYSA | Network setup for Malware Analysis | 31st May (63:55)
- CYSA | Analysing WannaCry | 1st June (65:18)
- CYSA | Dynamic Analysis of Malware | 2nd June (74:24)
- CYSA | GRC intro | 5th June (72:15)
- CYSA | RISK MANAGEMENT | 6th June (56:55)
- CYSA | Risk Response | 7th June (71:56)
- CYSA | Policies and Procedures | 8th June (56:31)
- CYSA | Baselines and Guidelines | 9th June (48:39)
- CYSA | Endpoint Security | 12th June (60:59)
- CYSA | IDS | 13th June (63:16)
- CYSA | Installing Snort | 14th June (63:25)
- CYSA | Working with Snort | 15th June (22:22)
- CYSA | Installing Falcon | 16th June (92:12)
- CYSA | Configuring Snort | 19th June (60:20)
- CYSA | Snort Modes | 20th June (77:05)
- CYSA | Finishing Snort | 21st June (63:59)
- CYSA | Rules for Snort | 22nd June (54:58)
- CYSA | Snort in IDS mode | 26th June (62:55)
- CYSA | Installibg sensors on Crowdstrike | 27th June (49:20)
- CYSA | Finishing Crowdstrike | 29th June (84:27)
- CYSA | Compliance | 3rd July (64:53)
- CYSA | Laws and Frameworks | 4th July (50:55)
- CYSA | Finishing up Compliance | 5th July (37:52)
- CYSA | SIEMS | 6th July (42:32)
- CYSA | Configuring SIEMS | 7th July (52:33)
- CYSA | Installing Splunk Forwarder | 10th July (57:04)
- CYSA | Verifying connectivity between Forwader and Receiver | 11th July (56:12)
- CYSA | SPL | 12th July (57:45)
- CYSA | Lab on Splunk | 13th July (54:08)
- CYSA | Cyberdefenders Lab on Splunk | 14th July (63:38)
- CYSA | BoTSV2 | 17th July (67:06)
- CYSA | Troubleshooting Splunk | 18th July (41:39)
- CYSA | BOTSv2 | 19th July (63:28)
- CYSA | Advanced SPL Queries | 20th July (59:43)
- CYSA | SOAR | 21st July (53:38)
- CYSA | SOAR 24th July (50:19)
- CYSA | SOAR Installation | 25th July (42:38)
- CYSA | Chronicle SOAR | 26th July (54:27)
- CYSA | Use cases of Siemplify | 28th July (56:54)
- CYSA | OpenStego (47:04)
- CYSA | Working on SOAR cases (40:32)
- CYSA | RAM Forensics | 7th Aug (59:48)
- CYSA | Volatility | 8th Aug (59:16)
- CYSA | Real world RAM forensics | 9th Aug (36:36)
- CYSA | Autopsy and Hard Drive Forensics | 10th Aug (60:59)
- CYSA | Persistent memory Forensics | 11th Aug (54:29)
- CYSA | IAM | 14th Aug (68:44)
- CYSA | IAM Lab | 16th Aug (47:53)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.