Showing 235–243 of 1052 results

  • Linux & IT , Programming

    Introduction to Bash, VIM & Regex

    In this course James Halliday (Substack), author with more than 750 packages at npm, walks you through an illuminating guide to everything Unix! You’ll learn how to take control of the Unix command line to write your own tools, automate tasks with shell scripts and the pipeline, compose regular expressions to master search patterns, and easily edit files with the …

  • Linux & IT , Shop

    CBTNuggets – Microsoft Excel (Office 365 & 2021) & Foundational Statistics for Data Analysis with Excel 2022

    Be the Excel guru on your team — someone who can create work schedules. Plan out complex projects. Track the income and expenses for entire companies. Take raw numbers and tell a compelling story.

    Once you’re done with this Microsoft Excel skills training, you’ll know how to create spreadsheets in Excel that let you store data, manipulate data with formulas, and …

  • Security , Shop

    SANS FOR578: Cyber Threat Intelligence (PDF-VID-MP3-LAB)

    Cyber threat intelligence represents a force multiplier for organizations looking to update their response and detection programs to deal with increasingly sophisticated advanced persistent threats. Malware is an adversary’s tool but the real threat is the human one, and cyber threat intelligence focuses on countering those flexible and persistent human threats with empowered and trained human defenders. During a targeted …

  • Security , Shop

    MGT414: SANS Training Program for the CISSP Certification (PDF-VID-MP3)

    MGT414 is fully updated for the May 2021 CISSP exam update! MGT414: SANS Training Program for CISSP Certification is an accelerated review course designed to prepare you to pass the exam. The course prepares students to navigate all types of questions included on the new version of the exam.

    SANS MGT414: SANS Training Program for CISSP® Certification is an accelerated …

  • Security , Shop

    SANS MGT514: Security Strategic Planning, Policy, and Leadership (VID-PDF-MP3)

    This information security course will provide you with the tools to build a cybersecurity strategic plan, an entire IT security policy, and lead your teams in the execution of your plan and policy.

    As security professionals we have seen the landscape change. Cybersecurity is now more vital and relevant to the growth of your organization than ever before. As a …

  • Security , Shop

    SANS SEC503: Network Monitoring and Threat Detection In-Depth (PDF-VID-LAB)

    SEC503: Network Monitoring and Threat Detection In-Depth delivers the technical knowledge, insight, and hands-on training you need to confidently defend your network, whether traditional or cloud-based. You will learn about the underlying theory of TCP/IP and the most used application protocols so that you can intelligently examine network traffic to identify emerging threats, perform large-scale correlation for threat hunting, and …

  • Security , Shop

    SANS SEC617: Wireless Penetration Testing and Ethical Hacking (PDF-VID-MP3)

    SEC617 will give you the skills you need to understand the security strengths and weaknesses in wireless systems. In this course, you will learn how to evaluate the ever-present cacophony of Wi-Fi networks and identify the Wi-Fi access points and client devices that threaten your organization; assess, attack, and exploit deficiencies in modern Wi-Fi deployments using WPA2 technology, including sophisticated …

  • Security , Shop

    SANS SEC542: Web App Penetration Testing and Ethical Hacking (PDF-VID-LAB)

    In SEC542, you will practice the art of exploiting web applications to find flaws in your enterprise’s web apps. You’ll learn about the attacker’s tools and methods in order to be a more powerful defender. Through detailed, hands-on exercises and with guidance from the instructor, you will learn the four-step process for web application penetration testing; inject SQL into back-end …

  • Security , Shop

    SANS SEC573: Automating Information Security with Python (PDF-VID-MP3-LAB)

    The best penetration testers can customize existing open source tools or develop their own tools. The ability to read, write, and customize software is what distinguishes the good penetration tester from the great penetration tester. This course is designed to give you the skills you need for tweaking, customizing, or outright developing your own tools to put you on the …