Showing 991–999 of 1056 results

  • Security , Shop

    SSCP (Systems Security Certified Practitioner)

    SSCP (Systems Security Certified Practitioner) Complete Video Course is a unique video product that teaches you the fundamentals of system security while also covering every objective in the SSCP certification exam so you can learn everything needed to pass the test, including the updates in the 2018 exam release, along with the knowledge and skills you need to advance your cybersecurity …

  • Security , Shop

    ZDResearch – Advanced SQL Injection

    ZDResearch Advanced SQL Injection is part of the ZDResearch Advanced Web Hacking curriculum. The curriculum consists of 10 modules, the first of which is Advanced SQL Injection.

    This course will teach you the fundamentals of SQL injection and help you fully comprehend the technique through hours of hands-on labs and real world demos, making you comfortable in pursuing the field on your …

  • Shop , Trading & Marketing

    Zero to $6k

    Freelance Copywriter, Would you believe me if I told you I was psychic? Bold claim, I know… but I’m a bold man.  So let me prove it by reading your mind right now.  Are you ready? Here we go… You’ve read dozens of copywriting blogs and books.  You’ve looked at a few copywriting courses.  Hell, you may have even landed a few clients. 

  • Networking , Shop

    CISCO – Implementing and Operating Cisco Security Core Technologies 350-701

    The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and …

  • Animation & Graphics , Shop

    How to Animate Logos & Icons in After Effects

    Adobe After Effects is a digital visual effects, motion graphics, and compositing application developed by Adobe Systems and used in the post-production process of film making, video games and television production. Among other things, After Effects can be used for keying, tracking, compositing, and animation.

    Adobe After Effects is a 2.5D animation software …

  • Networking , Shop

    Implementing and Operating Cisco Enterprise Network Core Technologies

    The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You’ll also learn to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN. This course will help you:

    • Configure, troubleshoot, and …
  • Security , Shop

    Offensive Security – Evasion Techniques and Breaching Defenses (PEN-300)

    Evasion Techniques and Breaching Defenses (PEN-300) is an advanced penetration testing course. It builds on the knowledge and techniques taught in Penetration Testing with Kali Linux, teaching students to perform advanced penetration tests against mature organizations with an established security function.

    PEN-300 teaches not only complex penetration testing skills, but also the mindset and methodology necessary to perform these tests.

     

    HOMEPAGE – <a ...

  • Security , Shop

    CompTIA Advanced Security Practitioner (CASP) CAS-003

    The CompTIA Advanced Security Practitioner (CASP) CAS-003 Complete Video Course is an engaging, self-paced video training solution that provides learners with 18 hours of personal, visual instruction from expert trainer Michael J. Shannon. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA CASP CAS-300 exam as well as a deeper understanding of …

  • Security , Shop

    Sektor7 – RED TEAM Operator: Malware Development Essentials & Intermediate Course

    Are you a pen tester having some experience with Metasploit or Empire frameworks? Or maybe you take your first steps as an ethical hacker and you want to know more about how all these offensive tools work? Or you are a blue teamer or threat hunter who needs to better understand the internal workings of malware?

    This course will provide you the answers you’re looking for. It will teach …