Showing 1–9 of 444 results

  • Security , Shop

    Hackers Arise – Cybersecurity/Hacker Starter Bundle

    With this package, you can master Linux and Python, learn the basics of networking, pass the CWA and Security+ certification exams, learn to hack Wi-Fi and take the first steps to becoming a master hacker!

    This package includes;
    1. Linux Basics for Hackers v2 companion videos ($99 value)
    2. Certified WhiteHat Associate (CWA) Prep v2 course ($99 value)
    3. Getting Started Becoming a Master …

  • Security , Networking

    FortiGate Network Security Engineer

    This learning path consolidates all INE’s FortiGate content into a single trackable path you can follow to your success! The series focuses on security technologies and solutions supported by Fortinet’s flagship next-generation firewall system – FortiGate. It covers fundamental and advanced concepts important for every FortiGate Administrator, System/Support Engineer, and Fortinet Network Security Expert (NSE) student – including …

  • Shop , Security

    iOS Application Security

    Can you guess an attack surface, which is constantly moving, connecting to several different wifi, stores user critical information and is still highly insecure? Well the answer is, Mobile applications. With almost 15% market share, iOS devices and iOS applications handle huge amount of user data. This requires these apps to be very secure and strong in terms of security.

    Though, …

  • Shop , Security

    Windows Post Exploitation w/ Kyle Avery

    Kyle Averystarted with Black Hills Information Security (BHIS) as an intern in October 2020 and was hired on as a full-time Penetration Tester in December 2020. When he is not on a test, he enjoys working on different R&D projects. Kyle says that he had always dreamed of working for BHIS because of community involvement, and the wealth of knowledge …

  • Security , Shop

    CyberChef for Security Analysts –

    CyberChef for Security Analysts will teach you how to use CyberChef to perform common data manipulation, transformation, deobfuscation, and extraction techniques using real security data*. This isn’t just a simple tutorial, you’ll work through diverse exercises using real-world security data to build a toolkit of techniques.

    Simply put, CyberChef for Security Analysts is an example-driven master class on dealing with the …

  • Shop , Linux & IT

    PowerShell for InfoSec

    PowerShell is an excellent cross-platform shell for executing commands and scripts on both local and remote machines. It is installed on Windows by default and is widely used by both network defenders and attackers. This course will cover key PowerShell concepts that both blue and red teamers should understand including logging, credential management, remote administration, security bypass techniques and popular …

  • Security , Shop

    Connect and Protect: Networks and Network Security

    In this course, you will explore how networks connect multiple devices and allow them to communicate. You’ll start with the fundamentals of modern networking operations and protocols. For example, you’ll learn about the Transmission Control Protocol / Internet Protocol (TCP/IP) model and how network hardware, like routers and modems, allow your computer to send and receive information on the internet. …

  • Security , Shop

    Certified Cloud Security Professional (CCSP)

    Certified Cloud Security Professional (CCSP) Complete Video Course provides 11 hours of comprehensive video that teaches you the six domains covered on the ISC(2) CCSP exam. ISC(2) established the Certified Cloud Security Professional (CCSP) credential to provide a path for cloud security professionals to display mastery of the necessary knowledge, skills, and abilities in cloud security design, implementation, architecture, management, controls, …

  • Security , Shop

    Automate Security into CI/CD Pipelines with Jenkins- Deep Dive on DevSecOps

    Popular data breaches and service outages are showing us that security cannot be a one-off time job, negligible, and can be executed only at the end of the final stages of application development. Otherwise, it is not only affecting company reputations but also customer loyalty to the delivered product and services.

    If Security is implemented and limited at the final stages, …