Showing 964–972 of 1068 results

  • Security , Shop

    Cybrary – MITRE ATT&CK Defender™ (MAD) ATT&CK Series

    This course is the fundamental piece of the MITRE ATT&CK Defender™ (MAD) series where we will explore how a threat-informed mindset can help focus our efforts towards improving and understanding how our defenses actually fare against real-world adversaries. 

    This course prepares you for the ATT&CK® Security Operations Center Certification. In this course, students should will gain a better understanding of how …

  • Security , Shop

    Cybrary – Building an InfoSec Lab

    This course will guide you through the basics of incorporating several Information Security Engineering Tools in your home and/or lab. By building this lab you will be able to obtain corporate-level security within your home network, as well as a higher understanding of the capabilities and advantages these tools bring to your network.

    This course will also help mirror an infrastructure …

  • Security , Shop

    ITPRO.TV – Mobile Security

    In this episode, Ronnie and Don discuss and demonstrate the exposure we have from unmanned mobile devices within a managed network. Don describes some of the problems with them as well as the possible attacks. He then demonstrates the way built security is working to protect itself on an Apple device by segregating applications and isolatingthe communication between application and …

  • Security , Shop

    Practical Hacking Master Class

    The Authors of this course or Any Party Related to this Course or Authors will not be Responsible for any Damages done by you to anyone in any way after taking this course, We Intend to Make a Better Cyber World by Teaching Every Little Practical Thing, and We Motivate you to use this Knowledge For Good Purposes.

     

    HOMEPAGE – <a ...

  • Programming , Shop

    Code with Mosh – Mastering React

    What else do you expect from a JavaScript library that was developed by Facebook?

    But seriously, if you don’t know how to build apps with React – then you’re falling behind the curve. It has quickly become the most popular JavaScript library since its release in 2011.

    Both new and seasoned developers are using it to build app front-ends that are fast, dynamic and …

  • Programming , Shop

    Code with Mosh – The Ultimate Java Mastery Series

    Java is the most widely used and in-demand programming language. It’s used in 90% of fortune 500 company websites, most big banks and financial companies, almost all Android apps, and much, much more… 

    But despite its popularity, there’s lots of bad info out there about Java. Dozens of myths, misconceptions, bad advice and downright poor tutorials.

     

    HOMEPAGE – https://codewithmosh.com/p/the-ultimate-java-mastery-series

     

    Original Price: $29
    Our …

  • Programming , Shop

    Code with Mosh – Complete Python Mastery

    Python is the most popular programming language in the world. The average salary for a Python developer is $116k in the USA. That’s almost $30k more than other developers! Python is used by big companies like Google, Facebook, Dropbox, Reddit, Spotify, Quora, etc. Mathematicians, scientists, engineers and developers love it because of its simple and elegant syntax. It’s the #1 …

  • Security , Shop

    Pentester Academy – Log File Analysis

    A log file analysis helps web masters gather statistics and key figures about the usage of a website or web server. Log file analysis is based on log files, which log all accesses to a web server. Today, JavaScript based tracking tools such as Google analytics have in many cases replaced the traditional analysis of log files. 

    A log file analysis often involves …

  • Security , Shop

    Bitdegree.org – Hacking Masterclass Ethical Hacking Course for Career Accelerator

    A lot of people get suspicious when they hear the term hacking. They associate it with criminal activity, harmful attacks, and stolen data leaks. They’re not wrong… To a certain degree.

    There are actually three types of hackers, commonly known as black hat, grey hat, and white hat. The kind described above wears the darkest one, of course. A grey hat hacker …