Showing 343–351 of 574 results

  • Security , Shop

    Recon and Vulnerability Detection

    Reconnaissance and vulnerability detection are foundational skills required for penetration testing, vulnerability assessments, and vulnerability management. These skills are the first steps of conducting a thorough and successful security assessment. In this Bootcamp, we will cover reconnaissance tools and techniques needed to enumerate and discover security vulnerabilities, including automated vulnerability scanners and manual techniques.

     

    HOMEPAGE – https://my.ine.com/bootcamps/93189fc0-c21b-4725-8667-e5d890b81a12

     

    Our Price: $5
  • Security , Shop

    Cloud Pentesting

    In this bootcamp we will cover exploiting Azure Cloud by gaining initial access using multiple methods, as well as bypassing common security controls to gain access to sensitive data and resources.

    Around the globe, cloud solutions have become more mainstream in organizations large and small. Cloud has been seen as a more secure alternative to on-premises solutions, but with cloud not …

  • Security , Shop

    ThorTeaches – CISSP

    Welcome, I am Thor Pedersen, and I am here to help you pass your CISSP certification.

    With over 300,000 enrollments from 180+ countries, my CISSP and CISM courses are both the “Best Selling” and “Highest Rated”.

    Who should take this course:

    • Students preparing for their CISSP exam.
    • Anyone wanting to get a deeper understanding of cyber security at a management level.
    • Cyber …
  • Security , Shop

    Security Threats, Attacks, and Vulnerabilities

    This foundational security training prepares security technicians to recognize, compare, and contrast different types of cybersecurity vulnerabilities and threats and indicators associated with network attacks.

    Whether you’re on your way to earning your CompTIA Security+ certification, working toward a different cybersecurity cert, or just trying to expand your knowledge of digital network security, this training represents a crucial first …

  • Security , Shop

    Advanced Web Hacking – NotSoSecure

    This is our 5-day Advanced-level web application security testing course.

    Much like our popular Advanced Infrastructure Hacking class, this class talks about a wealth of hacking techniques to compromise web applications, APIs, cloud components and other associated end-points. This class focuses on specific areas of appsec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). The …

  • Security , Shop

    Blockchain Security

    Identifying and differentiating between security threats and attacks on a Blockchain network. Blockchain security methods, best practices, risk mitigation, and more. All known (to date) cyber-attack vectors on the Blockchain. Performing Blockchain network security risk analysis. A complete understanding of Blockchain’s inherent security features and risks. Demonstrating appropriate Blockchain data safeguarding techniques.

     

    HOMEPAGE – https://my.ine.com/ITEssentials/courses/76e13a11/ine-blockchain-security

     

    Our Price: $3
  • Security , Shop

    Learn Network Hacking From Scratch

    Do you want to learn network hacking? Do you want to secure your home or work network? How about launching a new career in the world of professional penetration testing or ethical hacking? If so, this is the course for you.

    Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous …

  • Linux & IT , Security

    Microsoft AZ-500 Certification Course: Azure Security Technologies

    Properly securing resources while making them available to users that require access is a constant concern within an IT and cloud environment. This course will explore how to manage identities, provide role-based access, and secure data within an Azure ecosystem.

    During your journey, Skylines Academy will lead you through a series of sections, modules, and demos to prepare you for taking, …

  • Security , Shop

    Hacker House – Hands-on Hacking

    Hacker House Hands-On Hacking course is an intensive introductory course that teaches applied hacking methodologies in a hands-on practical orientated approach. Our course is engineered from decades of experienced cyber security practitioner’s knowledge to educate students on common cyber security tasks. Our course is delivered by expert hackers to prepare students on adversarial thinking and equip them for tasks conducted …