Security , Shop
Investigation Theory
If you’re a security analyst responsible for investigating alerts, performing forensics, or responding to incidents then this is the course that will help you gain a deep understanding how to most effectively catch bad guys and kick them out of your network. Investigation Theory is designed to help you overcome the challenges commonly associated finding and catching bad guys.
- I’ve got so …
- I’ve got so …
Security , Shop
ELK for Security Analysis
You must master your data If you want to catch bad guys and find evil. But, how can you do that? That’s where the ELK stack comes in.
ELK is Elasticsearch, Logstash, and Kibana and together they provide a framework for collecting, storing, and investigating network security data. In this course, you’ll learn how to use this powerful trio to perform …
Security , Shop
Practical Packet Analysis
It’s easy to fire up Wireshark and capture some packets…but making sense of them is another story. There’s nothing more frustrating than knowing the answers you need lie in a mountain of data that you don’t know how to sift through. That’s why I wrote the first Practical Packet Analysis book a decade ago. That book is now in its …
Programming , Shop
Designcode.io – CSS Layout and Animations
This course is focused on CSS Layout and Animations. Today I want to show you how you can layout challenging designs simply with CSS grid and Flexbox. We will also focus on creating engaging UI by adding CSS animations. We are going to use CodePen to layout portions of the design for a site called Letter.
The human brain is hardwired to pay …
Security , Shop
INE – OSCP Security Technology Prep Course
This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python …
Animation & Graphics , Shop
Blender Animation Bootcamp
This Blender course, or series of tutorials are for the motivated student that wants to begin perfecting their animation skills. With a beginner’s understanding of animation with Blender under your belt, the Animation Bootcamp is the next step in your journey to become a first-class animator. Follow along with pro Blender animator, Wayne Dixon, and take that next step!
This Blender …
Security , Shop
EC-Council – Certified Network Defender (Courseware, Lab Manuals & Tools)
Cybersecurity is a non-linear process that required a continuous approach to mitigating cyber risks.
According to Gartner, traditional “prevent and detect” approaches are inadequate. Developing a continuous Adaptive Security cycle helps organizations stay ahead of cybercriminals, by creating and improving security systems.
Certified Network Defender CND provides a comprehensive approach to effectively deal with security issues in today’s modern network
HOMEPAGE …
Programming , Shop
Designcode.io – UI Design for Developers
Learn just enough visual design to be dangerous as a developer
Many design courses focus on the finer details, heavy theories, getting you to the 99% of being a visual designer, but often disregard the code and handoff aspect. They end up alienating developers who just wish to learn the essentials. If you’re looking to learn “just enough” UI design to …
Security , Shop
INE – Wireshark Advanced Technologies
This Wireshark Advanced Technologies course, taught by bestselling author and trainer Robert Shimonski, features nearly 11 hours of training and is designed to provide network administrators with the practical skills needed to solve problems, analyze data, view the inner workings of packets, and perform advanced configurations to solve tough issues. In this course, Rob covers more advanced troubleshooting techniques, how …
Shop
Showing 1009–1017 of 1056 results