Showing 649–657 of 1052 results

  • Programming , Shop

    Full-Stack Web Development with Vue

    Learn how to use Vue, Node.js, Express, and MongoDB to create unique web applications and learn the fundamentals of full-stack development with the MEVN stack.

    MEVN (MongoDB, Express.js, Vue, and Node.js) is a popular NEW stack for building full-stack web applications. It allows developers to write an entire application–front-end, back-end, and database–using only JavaScript.

    This course takes the approach that its best …

  • Security , Shop

    Recon and Vulnerability Detection

    Reconnaissance and vulnerability detection are foundational skills required for penetration testing, vulnerability assessments, and vulnerability management. These skills are the first steps of conducting a thorough and successful security assessment. In this Bootcamp, we will cover reconnaissance tools and techniques needed to enumerate and discover security vulnerabilities, including automated vulnerability scanners and manual techniques.

     

    HOMEPAGE – https://my.ine.com/bootcamps/93189fc0-c21b-4725-8667-e5d890b81a12

     

    Our Price: $5
  • Programming , Shop

    Complete GitLab CI/CD Course with Docker | Kubernetes | Microservices

    Learn how to build production-ready CI/CD pipelines in one comprehensive and practical course!

    GitLab CI/CD is one of the most popular CI/CD platforms! More and more companies are adopting it. So, the need for Developers or DevOps engineers, who know how to build complete CI/CD pipelines on GitLab is increasing.

    While many GitLab courses teach you only the basics, we will dive …

  • Shop , Trading & Marketing

    YouTube channel: from idea to revenue

    Start sharing what you love on YouTube, and make money doing it!
    YouTube is like your reputation: you earn it first, and then the reputation, or algorithm in the case of YouTube, works for you. I believe …

  • Security , Shop

    Cloud Pentesting

    In this bootcamp we will cover exploiting Azure Cloud by gaining initial access using multiple methods, as well as bypassing common security controls to gain access to sensitive data and resources.

    Around the globe, cloud solutions have become more mainstream in organizations large and small. Cloud has been seen as a more secure alternative to on-premises solutions, but with cloud not …

  • Security , Shop

    ThorTeaches – CISSP

    Welcome, I am Thor Pedersen, and I am here to help you pass your CISSP certification.

    With over 300,000 enrollments from 180+ countries, my CISSP and CISM courses are both the “Best Selling” and “Highest Rated”.

    Who should take this course:

    • Students preparing for their CISSP exam.
    • Anyone wanting to get a deeper understanding of cyber security at a management level.
    • Cyber …
  • Programming , Shop

    Intermediate Python Tutorial

    This intermediate Python Tutorial training prepares learners to develop in the Python programming language.

    Python isn’t the world’s most popular coding language – that’s usually a spot held by Java or C. But it’s almost always awarded the third most popular programming language in the world. And all things considered, that’s pretty astonishing. This course is all about quickly …

  • Security , Shop

    Security Threats, Attacks, and Vulnerabilities

    This foundational security training prepares security technicians to recognize, compare, and contrast different types of cybersecurity vulnerabilities and threats and indicators associated with network attacks.

    Whether you’re on your way to earning your CompTIA Security+ certification, working toward a different cybersecurity cert, or just trying to expand your knowledge of digital network security, this training represents a crucial first …

  • Security , Shop

    Advanced Web Hacking – NotSoSecure

    This is our 5-day Advanced-level web application security testing course.

    Much like our popular Advanced Infrastructure Hacking class, this class talks about a wealth of hacking techniques to compromise web applications, APIs, cloud components and other associated end-points. This class focuses on specific areas of appsec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). The …