Showing 226–234 of 1052 results

  • Security , Shop

    Web Application Penetration Testing Professional (eWPTv2)

    Interested in learning how to assess and mitigate real-world web application vulnerabilities an organization could potentially be exposed to? The Web Application Penetration Testing Learning Path is a comprehensive and structured journey designed to equip aspiring penetration testers, Web App Security Professionals, Bug Bounty Hunters, and web developers with the essential skills and knowledge required to plan and perform a …

  • Security , Shop

    Windows Internals Red Team Operator [CWI-RTO]

    • Start your journey in Microsoft Windows Internals
    • Unveil common Win32/NT APIs used by the malwares
    • Understand malwares abusing internals from user-mode perspective
    • Perform various challenges/exercises to learn Windows Internals
    • Learn different kernel data structures (EPROCES, ETHREAD, KPCR etc.) through Windbg

     

    HOMEPAGE – https://cyberwarfare.live/product/windows-internals-red-team-operator-cwi-rto/

     

    Original Price: $299
    Our Price: $25
  • Security , Shop

    SANS FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response (PDF-VID-LAB)

    Whether you handle an intrusion incident, data theft case, employee misuse scenario, or are engaged in proactive adversary discovery, the network often provides an unparalleled view of the incident. SANS FOR572 covers the tools, technology, and processes required to integrate network evidence sources into your investigations to provide better findings, and to get the job done faster.

     

    HOMEPAGE – https://www.anonymz.com/…advanced-network-forensics-threat-hunting-incident-response/

     

    Original …

  • Security , Shop

    Website Hacking Techniques

    Learn Web Application Input Validation and Error Handling Testing to be a Master in Industry Based Web PenTesting

    Familiarize yourself with major web application attacks such as SQL injection, Cross-Site Scripting, Brute Force, Malicious File Upload, and Encryption attacks on websites. The inclusion of industry-based practicals to learn about web PenTesting can help professionals and beginners alike web PenTesting.

     

    HOMEPAGE – <a ...

  • Animation & Graphics , Shop

    Design for Developers – Enhance UI – Pro UIUX (Complete Pack)

    Learn design as a developer to improve your UI, UX, to make apps and websites look great!

    The book will be a step by step process ensuring you learn the fundamentals of design first. As you progress for each chapter, you grow those skills making your user interface designs better.

    Learn concepts such as Visual Hierarchy, which determines the order in which the …

  • Programming , Shop

    Build With Bricks

    A self-paced online course, teaching a step-by step process for creating Bricks websites with an efficient best-practice workflow.

    If you’re anything like many of my students over the past 6 years, you got started with web design because you wanted to be creative and build a lucrative business in the process.

    You chose …

  • Shop , Trading & Marketing

    Tube Freedom

    How I Make $100,000+ On YouTube WITHOUT SHOWING MY FACE Using YouTube Automation.

     

    HOMEPAGE – https://adamdelduca.gumroad.com/l/tubefreedom

     

    Original Price: $150
    Our Price: $25
  • Networking , Shop

    CCNP and CCIE Enterprise Core ENCOR 350-401, 2nd Edition

    CCNP and CCIE Enterprise Core ENCOR 350-401 Complete Video Course, Second Edition is a comprehensive training course that has been incorporated with the following changes to accommodate the ENCORE 1.1 Syllabus: Routing topics include EIGRP, Policy Based Routing, and newer IOS XE CLI commands. The Quality of Service (QoS) lesson has expanded from just theory and now includes the Modular QoS …

  • Security , Shop

    SANS FOR498: Battlefield Forensics & Data Acquisition

    FOR498, a digital forensic acquisition training course, provides the necessary skills to identify the many and varied data storage mediums in use today, and how to collect and preserve this data in a forensically sound manner despite how and where it may be stored. It covers digital acquisition from computers, portable devices, networks, and the cloud. It then teaches the …