Showing 73–81 of 620 results

  • Networking , Security

    CCNP Security Core Technologies SCOR 350-701

    This intermediate Cisco CCNP Security training covers the objectives in the 350-701 SCOR exam, which is the core exam for the CCNP Security certification.

    Cisco’s 350-701 SCOR exam tests a broad skill set, including network, cloud, and content security; endpoint protection and detection; secure network access, visibility, and enforcement. Covering these core security technologies will provide you with the knowledge tested …

  • Networking , Security

    Cisco CCNP Security SCOR (Exam 350-701)

    Cisco CCNP Security SCOR course at ITProTV is ideal for any learner that wants to understand enterprise-level approaches to defense in depth security of systems and data. This course targets implementers and lead architects of security solutions with a bias toward the use of Cisco security hardware and software releases.

     

    HOMEPAGE – https://www.itpro.tv/courses/cisco/cisco-ccnp-security-scor-exam-350701/

     

    Our Price: $6
  • Security , Shop

    Introduction Windows Malware Development

    Are you ready to delve into the world of advanced Windows malware development? In this comprehensive course, we will take you on a journey through the intricate art of crafting malware for Windows systems. Whether you’re an aspiring red teamer, a seasoned malware developer, or simply curious about the dark side of cybersecurity, this course is designed to equip you …

  • Security , Shop

    Investigating Windows Endpoints

    Unlock the secrets of Windows forensic investigation with my new course!

    Whether you’re looking to get into the field, already work in the field but want to step up your game, or just have an interest in digital forensics, look no further. This course is for you!

     

    HOMEPAGE – https://training.13cubed.com/investigating-windows-endpoints

     

    Original Price: $695
    Our Price: $25
  • Programming , Security

    Investigating Windows Memory

    Learn the foundations of how Windows memory is structured, how to acquire memory, how to analyze memory images using Volatility, MemProcFS, and WinDbg, and more!

     

    Original Price: $795
    Our Price: $25
  • Security , Shop

    How to scan the entire internet including AWS, Google cloud

    Unlock the advanced techniques of network scanning and broaden your penetration testing capabilities with this comprehensive course. Designed for aspiring ethical hackers and security enthusiasts, this course delves deep into the art of efficiently scanning millions of IP addresses and expanding the potential attack surface.

     

    HOMEPAGE – https://www.udemy.com/course/creating-a-shodan-clone-for-hackers-and-bug-bounty-hunters/

     

    Our Price: $3
  • Security , Shop

    Full Stack Web Attack

    Full Stack Web Attack is not an entry-level course. It’s designed to push you beyond what you thought was possible and set you on the path to develop your own workflow for offensive zero-day web research.

    This course is developed for web penetration testers, bug hunters and developers that want to make a switch to server-side web security research or see how serious adversaries …

  • Security , Shop

    Defending the Enterprise w/ Kent Ickler and Jordan Drysdale

    For the luckiest of enterprises, the awareness of an insecure environment is proven not in public discord after a breach but instead by effective security penetration tests. Time and time again Jordan and Kent have witnessed organizations struggle with network management, Active Directory, organizational change, and an increasingly experienced adversary.

    For new and legacy enterprises alike, Defending the Enterprise explores the …

  • Security , Shop

    Enterprise Forensics and Response

    The Enterprise Forensics and Response course is designed to provide students with both an investigative construct and techniques that allow them to scale incident response activities in an enterprise environment. The focus of the lecture portion of the course work is understanding the incident investigation process, objective oriented analysis and response, intrusion analysis and an exploration of attacker Tactics and …