• Linux & IT , Shop

    Cloud Academy – Managing Data Loss Prevention in Microsoft 365

    This course is designed to give you a solid understanding of data loss prevention (DLP) in Microsoft 365. You will learn how data loss prevention works and why you as a Microsoft 365 administrator would want to implement it.

    After a general DLP overview, you will be guided through a series of demonstrations that will show you how to create, test, and …

  • Shop , Security

    Reverse Engineering with Radare2

    In this course we will learn about the Radare2 reverse engineering framework. It is an open source free alternative to IDA Pro. I started to work with it because I think nobody will buy IDA Pro unless it is paid by your employer. Radare2 is a perfect free alternative, its only disadvantage is that it could be hard to start using it. This is …

  • Shop , Security

    ITPRO.TV – Python for Security

    Python is a great language for learning, writing web applications, and manipulating data. However, Python can be used for security testing as well. In this series, we will explore the use of Python in such concepts as brute force password cracking, making SSH connections programmatically, creating socket connections and port scanner a particular host, banner grabbing from open ports, and …

  • Shop , Security

    CyberDefense Pro (2021)

    CyberDefense Pro helps you teach students how to monitor and respond to traffic both proactively and analytically, using hands-on labs that challenge with high-stake scenarios they’ll face on the job. It covers 60 of the most up-to-date tools, like Burp Suite, Wireshark, Metasploit, Ettercap, and Nmap, to learn job skills used by Incident Responders, Threat Intelligence Analysts, and Cybersecurity Analysts …

  • Shop , Security

    ITPRO.TV – Penetration Testing

    In this series, Daniel and Mike discuss, explain, and demonstrate some of the common tools and techniques used by Penetrations Testers during a security audit. Watch as they explore topics like hacking platforms and test environments, creating BIND/REVERSE shells, discovering and exploiting Buffer Overflows, Cross Site Scripting attacks, Local and Remote File Inclusion attacks, SQL-Injection, Password …

  • Shop , Linux & IT

    Cybrary – CompTIA Linux+

    Linux is a flexible, open-source, low-cost platform favored for its ease of use in virtualization and cloud-based applications. More organizations are adopting Linux into their enterprise, and thus the need for certified employees is growing. Our self-paced online Linux+ training prepares students with the knowledge to become a CompTIA certified expert, spanning a curriculum that covers maintenance tasks, user assistance …

  • Networking , Shop

    IT Expert: Installing Network Cabling and Devices

    Networking cables are networking hardware used to connect one network device to other network devices or to connect two or more computers to share printersscanners etc. Different types of network cables, such as coaxial cableoptical fiber cable, and twisted pair cables, are used depending on the network’s physical layertopology, and size. The devices can be separated by a few meters (e.g. via Ethernet) or nearly unlimited distances.

     

    HOMEPAGE – https://www.anonymz.com/…it-training/skills/it-expertise-routing-switching

     

    Our …

  • Shop , Security

    Cybrary – Post Exploitation Hacking

    Increase your offensive Cyber Security knowledge with online Post Exploitation Hacking training. This online self-paced training will point you in the right direction with a methodology proven to provide the best results when performing hacking activities on highly secured systems with the mission objectives in mind, a skill needed for offensive hackers to be successful in their field.

    As the name …

  • Shop , Security

    Cybrary – Computer Hacking and Forensics

    Digital crime is more prevalent than ever, and the attacks are getting highly complex. Security software can’t pinpoint it—the eyes and expertise of a trained computer forensics professional is necessary. Our online Computer Hacking and Forensics training course teaches you how to become that professional. Love the idea of digital forensics investigation? That’s what computer forensics is all about. You’ll …