Security , Shop
x33fcon – From zero to first 0-day!
In the beginning, we will focus on understanding techniques: binary analysis, searching for various types of vulnerabilities and debugging. We “bite” into practical fuzzing and mistakes that keep programmers awake at night using their non-deterministic occurrence. Participants will learn techniques for analyzing application weaknesses, writing grammars, and obtaining test corpora guaranteeing exciting results.After understanding the aspects of bughunting, …Programming , Shop
ArdanLabs – Ultimate Rust: Foundations & Best Practices
The Ultimate Rust Foundations class starts with an introduction to Rust, and why you benefit from using – both as a foundation, and within your existing ecosystem.
This course covers many best practices to help you with integrate Rust into your workflow, and let Rust’s tooling work for you. It includes formatting, linting, dependencies, vulnerabilities, code style and general development advice.
HOMEPAGE …
Linux & IT , Shop
Red Hat Certified Specialist in Containers and Kubernetes Exam (EX180)
This course is designed to help you obtain the knowledge and skills required to pass the Red Hat Certified Specialist in Containers and Kubernetes (EX180) exam. By taking this course, you will gain hands-on experience creating, managing, and deploying containerized solutions using Red Hat OpenShift.
HOMEPAGE – https://learn.acloud.guru/course/red-hat-certified-specialist-in-containers-and-kubernetes-exam/overview
Original Price: $35
Our Price: $5
Linux & IT , Shop
Red Hat Certified System Administrator (RHCSA) Exam EX200
This entry-level Red Hat Certified System Administrator (RHCSA) Exam EX200 training prepares junior systems admins to monitor and manage the Linux operating system and administer enterprise networks and devices that run it.
HOMEPAGE – https://www.cbtnuggets.com/it-training/linux/rhcsa
Our Price: $6
Security , Shop
ANDROID USERLAND FUZZING AND EXPLOITATION
During this course, you will be introduced to the world of Android user-land exploitation techniques used by threat actors. We will start by covering the basics of ARM assembly language and move into reversing the Android Native components to find vulnerabilities. During reverse engineering, we will teach how to find functions that can be harnessed and fuzzed to identify 0-day …
Security , Shop
SOC Analyst (Blue Team) Live Workshop
Our Blue Team Live Workshop is not your ordinary online course. This is a live, interactive, and hands-on workshop that immerses you in the real-world scenarios and challenges of a SOC analyst. You will learn how to use the latest tools and techniques to monitor, detect, and respond to cyberattacks and breaches.
This program offers an excellent opportunity to develop the …
Security , Shop
Red Team Infra Dev [CRT-ID]
- Develop OPSEC safe Red Team Infrastructure
- Utilize Red Team Infra for Internal / External Operations
- Utilize Legitimate Cloud / On-Premise Services
- Create your own Re-director / Payload Server Features
- Perform Professional Red Team Attack Case Study
HOMEPAGE – https://cyberwarfare.live/product/red-team-infra-developer/
Original Price: $49
Our Price: $7
Programming , Shop
Professional App Development With CI/CD
In short, these are the key concepts you will learn step-by-step:
- Automating common workflows using powerful CI pipelines with Bitrise
- How you can fully automate the deployment of your app to Google Play
- How Git branches are commonly arranged in the industry for projects at scale
- Writing simple unit and UI tests for your apps and automatically running them before …
Programming , Shop
Learn Reflection with Java
Reflection is a powerful Java feature that can be used to expand the capabilities of a program, to examine the class or object internals at runtime.
Java Reflection is quite powerful and can be very useful. Java Reflection makes it possible to inspect classes, interfaces, fields, and methods at runtime, without knowing the names of the classes, methods, etc. at compile …
Premium
Showing 28–36 of 1046 results