Shop , Security
CBTNuggets – (ISC)² CISSP Online Certification Training
In this intermediate (ISC)² skills training, Keith Barker and Ben Finkel cover the CISSP methodology objectives in the CISSP exam, which is the one required exam to earn the CISSP certification.The CISSP is one of the most valued certifications available to IT security professionals — and employers. There’s a reason for that. CISSP not only …Shop , Security
Cybrary – Intro to Malware Analysis and Reverse Engineering
DIFFICULTY: AdvancedIf you’ve been looking for an intense, methodological intro training class on malware analysis, you’ve come to the right place. Our self-paced, online malware analysis training class provides an in-depth look into the world of malware and reverse engineering. Weaving complex methods with practical application, our training ensures the highest level of comprehension regarding …
Shop , Security
Cybrary – Incident Response and Advanced Forensics
DIFFICULTY: AdvancedIn the Incident Response and Handling training course, students will be introduced to incident response, how to create and implement protection plans, how to investigate incidents forensically, insider and malware threats, and incident recovery. Incidence response refers to the strategized approach and processes that take place after an organization suffers some sort of security …
Shop , Security
ISC-The Premier Security Administrator Certification (SSCP)
Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets. SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².
HOMEPAGE …
Shop , Security
SSCP (Systems Security Certified Practitioner)
SSCP (Systems Security Certified Practitioner) Complete Video Course is a unique video product that teaches you the fundamentals of system security while also covering every objective in the SSCP certification exam so you can learn everything needed to pass the test, including the updates in the 2018 exam release, along with the knowledge and skills you need to advance your cybersecurity …
Shop , Security
ZDResearch – Advanced SQL Injection
ZDResearch Advanced SQL Injection is part of the ZDResearch Advanced Web Hacking curriculum. The curriculum consists of 10 modules, the first of which is Advanced SQL Injection.
This course will teach you the fundamentals of SQL injection and help you fully comprehend the technique through hours of hands-on labs and real world demos, making you comfortable in pursuing the field on your …
Security , Shop
Offensive Security – Evasion Techniques and Breaching Defenses (PEN-300)
Evasion Techniques and Breaching Defenses (PEN-300) is an advanced penetration testing course. It builds on the knowledge and techniques taught in Penetration Testing with Kali Linux, teaching students to perform advanced penetration tests against mature organizations with an established security function.
PEN-300 teaches not only complex penetration testing skills, but also the mindset and methodology necessary to perform these tests.
HOMEPAGE – <a ...
Security , Shop
CompTIA Advanced Security Practitioner (CASP) CAS-003
The CompTIA Advanced Security Practitioner (CASP) CAS-003 Complete Video Course is an engaging, self-paced video training solution that provides learners with 18 hours of personal, visual instruction from expert trainer Michael J. Shannon. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA CASP CAS-300 exam as well as a deeper understanding of …
Shop , Security
Sektor7 – RED TEAM Operator: Malware Development Essentials & Intermediate Course
Are you a pen tester having some experience with Metasploit or Empire frameworks? Or maybe you take your first steps as an ethical hacker and you want to know more about how all these offensive tools work? Or you are a blue teamer or threat hunter who needs to better understand the internal workings of malware?
This course will provide you the answers you’re looking for. It will teach …
Security
Showing 649–657 of 692 resultsSorted by latest