Showing 1000–1008 of 1061 results

  • Animation & Graphics , Shop

    How to Animate Logos & Icons in After Effects

    Adobe After Effects is a digital visual effects, motion graphics, and compositing application developed by Adobe Systems and used in the post-production process of film making, video games and television production. Among other things, After Effects can be used for keying, tracking, compositing, and animation.

    Adobe After Effects is a 2.5D animation software …

  • Networking , Shop

    Implementing and Operating Cisco Enterprise Network Core Technologies

    The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You’ll also learn to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN. This course will help you:

    • Configure, troubleshoot, and …
  • Security , Shop

    Offensive Security – Evasion Techniques and Breaching Defenses (PEN-300)

    Evasion Techniques and Breaching Defenses (PEN-300) is an advanced penetration testing course. It builds on the knowledge and techniques taught in Penetration Testing with Kali Linux, teaching students to perform advanced penetration tests against mature organizations with an established security function.

    PEN-300 teaches not only complex penetration testing skills, but also the mindset and methodology necessary to perform these tests.

     

    HOMEPAGE – <a ...

  • Security , Shop

    CompTIA Advanced Security Practitioner (CASP) CAS-003

    The CompTIA Advanced Security Practitioner (CASP) CAS-003 Complete Video Course is an engaging, self-paced video training solution that provides learners with 18 hours of personal, visual instruction from expert trainer Michael J. Shannon. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA CASP CAS-300 exam as well as a deeper understanding of …

  • Security , Shop

    Sektor7 – RED TEAM Operator: Malware Development Essentials & Intermediate Course

    Are you a pen tester having some experience with Metasploit or Empire frameworks? Or maybe you take your first steps as an ethical hacker and you want to know more about how all these offensive tools work? Or you are a blue teamer or threat hunter who needs to better understand the internal workings of malware?

    This course will provide you the answers you’re looking for. It will teach …

  • Networking , Shop

    Cisco Enterprise Advanced Routing and Services (300-410 ENARSI)

    In this 232-video, intermediate CCNP Enterprise (300-410 ENARSI) training, CBT Nuggets trainers Keith Barker and Knox Hutchinson cover the knowledge network engineers need to implement and troubleshoot advanced routing technologies and services for Cisco enterprise networks.

    Expanding on the knowledge covered in the 350-401 ENCOR training, this forty-part series covers advanced networking topic such as EIGRP, OSPF v2 and v3, and MP-BGP, and …

  • Networking , Shop

    NetworkLessons – Routing & Switching Courses

    The Routing and Switching training ensures that you have can demonstrate to others that you have the knowledge and skills to install, configure, operate, and troubleshoot routed and switched networks from top technology providers such as Cisco, HP, Arris and Juniper Networks.

    You’ll Learn These Core Skills:

    • Work with routers, switches and wireless devices to configure and troubleshoot VLANs, Wireless LANs and Inter-VLAN routing.
    • Configure and troubleshoot redundancy on …
  • Security , Shop

    Sektor7 – RED TEAM Operator: Privilege Escalation in Windows Course & RED TEAM Operator: Windows Persistence Course

    You’re interested in Windows security, right? Otherwise you wouldn’t be here. You are either led by natural curiosity of security researcher or doing penetration testing professionally, or both. And maybe you need to get better understanding of how privilege escalation works in Microsoft environments.

    So here’s what’s in the course.
    It is indeed about escalating privileges in Windows. But it’s not only …

  • Security , Shop

    ZDResearch – Advanced Web Hacking

    This course is tailored for all security researchers, penetration testers and web designers who like to receive in-depth knowledge of web application security from a hacker’s perspective.

    This is the flagship web application security course provided by ZDResearch Training. In this course you will go through a multitude of web application security topics, all accompanied by demos and hands-on labs. Topics …