Showing 19–27 of 504 results

  • Security , Shop

    Active Directory Security Configuration & Management

    Active Directory is the central piece of most organizations’ identity and authentication infrastructure. Properly securing it from attackers is a critical step in protecting your organization from a costly compromise. From the basics of an AD structure, to specific Group Policy settings to restrict authentication types, this course will take you through the necessary steps to properly secure your AD …

  • Security , Shop

    SANS SEC556: IoT Penetration Testing (PDF-LAB)

    SEC556 will familiarize you with common interfaces in IoT devices and recommend a process along with the Internet of Things Attack (IoTA) testing framework to evaluate these devices within many layers of the Open Systems Interconnection (OSI) model. From firmware and network protocol analysis to hardware implementation issues and all the way to application flaws, we will give you …

  • Shop , Security

    Cybersecurity Attack and Defense Fundamentals Specialization

    This Specialization can be taken by students, IT professionals, IT managers, career changers, and anyone who seeks a cybersecurity career or aspires to advance their current role. This course is ideal for those entering the cybersecurity workforce, providing foundational, hands-on skills to solve the most common security issues organizations face today.

    This 3-course Specialization will help you gain core cybersecurity …

  • Shop , Security

    Building a Career in Cybersecurity

    Cybersecurity is an exciting, fast-growing industry. But how do you get started in the field and stand out from the competition? What do you need to fast track your cybersecurity career?

    In this video course, industry expert, professor, and bestselling author Yuri Diogenes guides you through the steps toward a successful career in cybersecurity. Learn about the roles and responsibilities of …

  • Shop , Security

    In-Depth Red Teaming: APT & Adversary Simulation

    How would your people respond to a REAL cyber attack? Not just your technology teams, but your financial, legal, operational, and leadership teams too? We build a comprehensive plan with you to test the responses your people have to perceived real-world cyber threats, and make sure you’re prepared when the real time comes.




    Original Price: $1,280
    Our Price: $30
  • Shop , Security

    Practical Pentesting: featuring Brad Stine

    Need to create a pen test final report? In this course, learn how to properly pre-plan and execute a successful pen test following the client’s scope of work.




    Our Price: $5
  • Shop , Security

    The Bug Hunter’s Methodology Live Course

    I am thrilled to introduce you to The Bug Hunter’s Methodology LIVE, my masterclass designed for aspiring and seasoned offensive security professionals, including web application security testers, red teamers, and bug bounty hunters.

    The Bug Hunter’s Methodology (TBHM) is a two-day, paid, virtual training that aims to equip you with the latest tools, techniques, and strategies, plus provide …

  • Programming , Security

    Python for Cybersecurity Specialization

    Master Python for a variety of cybersecurity tasks. This Specialization provides an application-driven introduction to using Python for cybersecurity.

    Python is one of the most popular and widely-used programming languages in the world due to its high usability and large collection of libraries. This learning path provides an application-driven introduction to using Python for cybersecurity. Python can …

  • Shop , Security

    Privilege Escalation for OSCP and Beyond – Bundle!

    This course teaches privilege escalation in Linux, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (170+), and an intentionally misconfigured Debian VM which can be used by students to practice their own privilege escalation.

    This course teaches privilege escalation in Windows, from basics …