Shop , Security
Exploiting IoT Devices (W44)
Exploitation: IoT Device Security is a unique course that offers security professionals the ability to assess the security of these smart devices. In this course, we will discuss security and privacy issues in IoT devices on two different layers, like firmware, hardware, Bluetooth and protocols, and what happens if organizations leave the IoT device vulnerable. The course will also demonstrate …
Shop , Security
(ISC)² CISSP – Certified Information Systems Security Professional
This training teaches the skills and knowledge that are necessary to plan and manage an effective information systems security posture for an entire organization. This course covers broad managerial topics and deep technical familiarity with a wide range of organizational topics and IT/IS domains, including risk management, security architecture, development security and much more.
HOMEPAGE – https://www.cbtnuggets.com/it-training/(isc)2/isc-2-cissp
Original Price: $59
Our Price: …
Shop , Security
Uncle Rat’s Ultimate Broad Scope And API Hacking guide
Bug bounties are very popular, I see a lot of students who will benefit from our first part where it’s more aimed at main app hacking but in this section we want to cater to the students who have already got a bit of experience but want to see how they can up their game with broad scope hacking or …
Shop , Security
Introduction To Bug Bounties – Main Web App Hacking
Welcome to Uncle Rat’s Ultimate Bug Bounty Guide – Part 1 – Main App Hacking Introduction
Hi, I’m Uncle Rat, and I’m here to disrupt the traditional teaching industry. Forget the bland, cookie-cutter video courses you’re used to – this course offers a guided experience that takes you from practice platform to real-world bug bounty targets.
HOMEPAGE – https://www.udemy.com/course/uncle-rats-ultimate-bug-bounty-guide-part-1-2025/
Our Price: $5
Shop , Security
Computer Hacking Forensic Investigator (CHFI)
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.
HOMEPAGE …
Shop , Linux & IT
DevSecOps Bootcamp
Stand out and 10x your value with this in-demand skills. Cybercrime is expected to cost companies 10.5 Trillion annually. With the rate of attacks increasing, the demand for DevSecOps skills is at an all-time high. Be recognized as a top tech professional and land high-paying jobs.
HOMEPAGE – https://www.techworld-with-nana.com/devsecops-bootcamp
Original Price: $1,795
Our Price: $30
Security , Shop
Certified Network Defender (CND) v3 (PDF & Tools)
The C|ND program designed by industry experts prepares network defenders with strategic, technological, and operational network security capabilities, enabling them to design, develop, and maintain secure networks.
Students will learn the critical skills required to defend their networks and operating environments across local networks, endpoints, cloud infrastructure, applications, OT, and mobile. They will also acquire knowledge of effective proper log analysis, …
Shop , Linux & IT
DevSecOps Masterclass
This training is a comprehensive, focused, and practical approach at implementing Security for your Continuous Delivery Pipeline. The training is backed by a ton of hands-on labs, original research, and real-world implementations of DevSecOps that work.The training begins with a detailed view of Continuous Application Security, through Application Security Automation with SAST, DAST, SCA, IAST and RASP. We will focus …
Shop , Linux & IT
Investigating Linux Devices
Starting with fundamental principles, Investigating Linux Devices rapidly progresses to encompass log analysis, file systems, persistence mechanisms, memory forensics, live response, and more! This course offers extensive hands-on practice and a capstone involving the analysis of a compromised system. Tailored for both beginners and seasoned professionals, it serves as an ideal resource for mastering Linux forensics!
HOMEPAGE – https://training.13cubed.com/investigating-linux-devices
Original Price: …
Security
Showing 55–63 of 692 resultsSorted by latest