Shop , Networking
CBTNuggets – Check Point CCSA & CCSE (R81)
This training covers both the Check Point Certified Security Administrator (CCSA) and Check Point Certified Security Expert (CCSE) certifications. Learn to install, configure, and manage Check Point R81, including gateways, security policies, threat prevention, and advanced network protection. Build hands-on skills with firewalls, VPNs, and intrusion prevention systems. Ideal for security admins preparing for certification or …
Shop , Security
SOC Analyst Professional – Foundations
This beginner-friendly course covers essential IT fundamentals to build the critical skills every cybersecurity professional needs.
TrainSec’s SOC Analyst Foundations course provides a hands-on introduction to cybersecurity fundamentals. Students learn computer hardware basics, networking protocols, Linux essentials, packet sniffing, virtualization setup, Windows server deployment, and Active Directory management—developing the technical skills required for effective cybersecurity operations and incident response.
HOMEPAGE – <a ...
Shop , Security
ISACA Certified Information Security Manager (CISM)
This Certified Information Security Manager CISM training from ISACA covers how to lead and manage information security teams, with expertise in infosec governance, management, risk management and incident response — and prepares you to earn your CISM certification. This ISACA training can be used for CISM exam exam prep, onboarding new security engineers, or as a ISACA reference resource.
HOMEPAGE – …
Shop , Security
DevSecOps: Insecure Docker Registry
Many organizations deploy private registry servers in their internal/external application development/deployment environment. Unfortunately, most often, these servers are not securely deployed. In this entirely lab-based course, we will look at various configurational vulnerabilities in docker registry servers. In these labs, we have used common deployment architectures of a registry server and shown how an attacker can get valuable information out …
Shop , Security
AI for Cybersecurity & Bug Bounty Hunting
Are you ready to supercharge your cybersecurity skills with the power of Artificial Intelligence?
Join me and let’s explore how AI is changing the cybersecurity game.
“AI for Cybersecurity & Bug Bounty Hunting” is a hands-on course designed for ethical hackers, security enthusiasts, and IT professionals who want to stay ahead of the curve. Learn how AI and machine learning are transforming the …
Shop , Linux & IT
The Dark Side of AI: Jailbreaking, Injections, Hallucinations & more
Step over to the dark side and learn about the vulnerabilities, exploits, and unintended consequences that AI models like LLMs suffer from, with hands-on prompting and exercises.
HOMEPAGE – https://zerotomastery.io/courses/dark-side-of-ai/
Our Price: $3
Shop , Security
Advanced Ethical Hacking Bootcamp: Network Hacking & Security
Take your ethical hacking skills to the next level by learning network hacking techniques, from Man In The Middle and DNS spoofing to router exploits and custom payload creation. Master real-world attack methods, bypass security measures, and gain the skills needed for penetration testing and cybersecurity roles.
HOMEPAGE – https://zerotomastery.io/courses/advanced-ethical-hacking/
Original Price: $25
Our Price: $3
Shop , Security
Advance Live Bug Bounty And Ethical Hacking (2025)
Advance Live Bug Bounty And Ethical Hacking (2025) is your ultimate destination to master real-world ethical hacking and live bug bounty skills. Designed for beginners, intermediates, and experienced hackers, this course offers live hacking sessions, real-world simulations, and step-by-step techniques used by top security researchers in 2025.
HOMEPAGE – https://www.udemy.com/course/advance-live-bug-bounty-and-ethical-hacking-2025
Our Price: $3
Shop , Security
Incident Handling & Response Professional (New!)
Are you interested in learning how to professionally detect, analyze, and respond to real-world security incidents across modern enterprise environments? The Incident Handling & Response Professional Learning Path is designed to introduce you to the full incident response lifecycle and the daily operations of an incident responder, combining practical skills with real-world scenarios and tooling. This learning path will teach …
Security
Showing 19–27 of 692 resultsSorted by latest