Shop , Security
Kubernetes Threat and Attack Detection
Kubernetes Threat and Attack Detection is an essential video course for Kubernetes practitioners aiming to proactively protect their clusters against security threats. Led by expert instructor Chris Jackson, this course guides you through robust strategies for detecting, analyzing, and responding to malicious activities and potential security breaches.
HOMEPAGE – https://www.informit.com/store/kubernetes-threat-and-attack-detection-video-course-9780135447246
Original Price: $240
Our Price: $10
Shop , Security
CBTNuggets – CompTIA PenTest+ (PT0-003)
Learn how to simulate real-world cyberattacks, uncover network vulnerabilities, and sharpen your ethical hacking skills with this intermediate PenTest+ training. You’ll practice modern penetration testing techniques in realistic labs, document findings, and prepare for the CompTIA PenTest+ (PT0-003) exam.
HOMEPAGE – https://www.cbtnuggets.com/it-training/comptia/pentest-plus
Original Price: $59
Our Price: $5
Shop , Security
Mr. Robot Hacks
Follow the hacks of Elliot and f/society in this intriguing and unique class. Master OTW teaches you the realistic hacks of Evil Corp, the prison, the FBI, and others by the team at f/society. This is a very fun course with lots of serious hacking.
HOMEPAGE – https://hackersarise.thinkific.com/courses/mr-robot-hacks
Original Price: $99
Our Price: $15
Shop , Linux & IT
Certified Kubernetes Security Specialist (CKS)
Get ready for the Certified Kubernetes Security Specialist (CKS) exam! In this video training course, author and trainer Chris Jackson will provide in depth discussion of exam concepts, objectives, and demonstrate key topics so you get the edge you need to successfully study for and pass the test. This 21-hour course follows the CKS blueprint domains and includes not only …
Shop , Programming
Web Security Dev Academy – 12-week online program
Developers with security skills in highest demand – Are you prepared? Become a Security-Oriented Software Developer & watch your salary soar! ?
By the end of this program, you will…
Have a complete understanding of the Web security model and fill all your knowledge gaps as a developerLearn Web security vulnerabilities and implement industry-standard prevention methods
Know how to design & build an …
Shop , Security
Digital Forensics and Computer Examiner Training
This digital forensics training equips investigators to collect, analyze, and report digital evidence of intrusions and security incidents. Learn file recovery, network forensics, and incident response skills that boost any IT resume. Ideal for criminal investigations or cybersecurity pros, this digital forensics skills course is perfect for onboarding new forensic investigators or as a cybersecurity reference resource.
HOMEPAGE – https://www.cbtnuggets.com/it-training/cyber-security/digital-forensics-computer-examiner
Original …
Shop , Security
Threat Hunting Professional (New!)
The Threat Hunting Professional Learning Path is an in-depth collection of courses designed for cybersecurity practitioners seeking to develop proactive defense strategies. You’ll start by building a strong core foundation with the fundamentals, then advance through intelligence integration and hunting strategies. You’ll explore both network and endpoint threats, which will give you the practical skills needed to identify threats across …
Shop , Security
DevOps for Pentesters
DevOps has revolutionised the traditional software delivery lifecycle resulting in faster product delivery, faster issue resolution, greater scalability, and more automation.
Throughout this course, you will learn how DevOps practices can bring similar benefits to your penetration testing and red team operations by:
- Automating the building & testing of your tools.
- Preventing bad/breaking changes being merged into your codebase.
- Automating the …
Shop , Security
Network Penetration Testing Essentials (PEN-100)
PEN-100: Network Penetration Testing Essentials is foundational OffSec training for aspiring ethical hackers. Learn Linux and Windows command line, network protocols, scripting with Bash and Python, and explore essential security tools like Nmap, Kali Linux, and Metasploit. Build a strong ethical hacking mindset with hands-on practice in reconnaissance, exploitation, and post-exploitation techniques. Perfect for beginners looking to start a cybersecurity …
Security
Showing 28–36 of 692 resultsSorted by latest