Showing 973–981 of 1068 results

  • Programming , Security

    Coursera.org – Secure Coding Practices Specialization

    This Specialization is intended for software developers of any level who are not yet fluent with secure coding and programming techniques.Through four courses, you will cover the principles of secure coding, concepts of threat modeling and cryptography and exploit vulnerabilities in both C/C++ and Java languages, which will prepare you to think like a hacker and protect your organizations information. …

  • Shop , Trading & Marketing

    Linx YouTube Ads Course

    How You Can Leverage The Stunning Power Of Youtube Ads To Increase Traffic, Generate Higher Quality Leads & Convert Them Into Life-Long Customers.

    Discover how our students were able to start advertising on Youtube profitably, and scale and grow their businesses
    – Better Results Than Facebook Ads
    – No Media Buying Experience Required
    – Start With A Small …

  • Animation & Graphics , Shop

    Gumroad.com – VFX GRACE – Realistic Dynamic Clouds

    Do you want to make realistic clouds with Houdini? Do you know how to analyze the clouds in nature? Are you still struggling with simulating the clouds in nature? Here it is. A rare tutorial in today’s market on simulating realistic dynamic clouds. With a total of 19 lessons and about 10 hours in duration, this tutorial covers the basic …

  • Security , Shop

    Pentester Academy – Android Security and Exploitation for Pentesters

    Android Security and Exploitation for Pentesters is a course intended for people who want to get started into Android Security, or even who are a bit familiar with the Android security space but want to learn more about Android Application Security. This is a hands-on course where you will get to reverse applications, find security vulnerabilities, perform debugging and API …

  • Security , Shop

    Pentester Academy – Windows Forensics

    This course will familiarize students with all aspects of Windows forensics.By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, analyze filesystems, analyze network traffic, analyze files, perform memory analysis, and analyze malware for a Windows subject on a Linux system with readily available free and open source tools.  Students will also …

  • Security , Shop

    Pentester Academy – Make your own Hacker Gadget

    All of us have heard about or used Hacker Gadgets like the WiFi Pineapple, Minipwner, Pwn Plug, R00tabaga etc. They are fantastic to use for demos, in social engineering tasks, explaining security implications in a fun way to non security professionals and in actual pentest task automation! but what does it take to build one? In this course, we will …

  • Programming , Shop

    Code with Mosh – The Ultimate Docker Course

    Docker is a platform for building, running, and shipping applications with ease. That’s why most companies use it and are looking for software or DevOps engineers with Docker skills.

    If you want to increase your employability, excel in your career, and reach highly-paid senior positions, you must have Docker in your resume. And not only that, you should understand how it …

  • Programming , Shop

    Pentester Academy – Scripting Wi-Fi Pentesting Tools in Python

    In this course we will learn how to create Wi-Fi Pentesting tools – sniffer and packet injectors using Python. We will look at both using libraries like scapy and working with raw sockets.
    This course is ideal for students who are aware of the basics of Wi-Fi Security and Python Scripting. You do not need to be a master …

  • Security , Shop

    Pentester Academy – USB Forensics and Pentesting

    This course will cover USB in detail with an emphasis on understanding USB Mass Storage devices (also known as flash drives or thumb drives).By the end of this course students will know how to sniff USB traffic using open source tools, be able to write-block USB mass storage devices using software and microcontroller-based hardware, be able to impersonate other USB …