Shop , Security
Cybercrime And You: Staying Safe in a Hyper-Connected World
In our hyper-connected world, where instant communication between people, data and machines occurs over global, open networks, cybercrime has become an inescapable part of our daily lives.
More and more people are increasingly reliant on online spaces to live, study, work, and entertainment and leisure. However, without the requisite cybersecurity infrastructure and knowledge as we learn and work from home, we …
Shop , Networking
CompTIA Cloud Plus Exam Bootcamp (CV0-002)
This course is taught by a current CompTIA SME and CompTIA Cloud Plus Train the Trainer. This course is meant to get just enough to pass the course and is meant for professionals that have IT experience. Published LinkedIn author on Cloud Plus.. Get Certified promptly and efficiently.The CompTIA Cloud+ certification is an internationally recognized validation of the knowledge required …
Shop , Security
Container Security
Docker and Linux containers are changing the way applications are developed, tested and deployed. The Container Security Learning Path provides an overview of the key technologies used by Docker containers and how to utilize them for security. The learning path includes a review of Kubernetes, the most popular container orchestration system, focused on creating and running a secure cluster.
HOMEPAGE – …
Shop , Security
EC-Council – Open Source Intelligence
If you have ever wondered how somebody is able to find that much information or data about you or your organization, then this is the course for you. Since Open-Source Intelligence is one of the most crucial phases in any cyberattack, you will find out what the bad guys can learn about you or your company. Information and data have …
Security , Shop
Automated Mobile Application Security Assessment with MobSF
Mobile Application market is growing like anything and so is the Mobile Security industry. With lots of frequent application releases and updates happening, conducting the complete security analysis of mobile applications becomes time consuming and cumbersome mainly because of the overheads in setting up and maintaining a mobile application testing environment. This course will introduce an extendable, and scalable web …
Shop , Security
Mastering Nmap Course
Nmap is the most powerful information gathering tool. It has many advanced features. This is a very popular tools among hackers, network admins and pentester.
If you want to be a successful network admin then you have to expertise the nmap because it help network admins to do pentest the network and patch some of the vulnerability and if you don’t …
Security , Shop
Node.js Security: Pentesting and Exploitation
Node.js® is a platform built on Chrome’s JavaScript runtime for easily building fast, scalable network applications. This new technology is widely getting adopted in various organisations. Like any platform, Node.js has it’s on set of features that developers blindly use without much thought on security. The heart of Node is JavaScript, so it inherits most of the issues that are …
Animation & Graphics , Shop
Bloop Animation – Maya Animation
We’ve designed this course to be tailored specifically for aspiring animators, or professional animators transitioning from a different program. We’ve been working with Maya for years. Both in the commercial world and on our own films. It is the industry standard for 3D animation, so if you’re planning on getting into the animation industry, this is the best place to start.
HOMEPAGE – …
Shop , Security
Black Hat Python: Python For Pentesters
Need automated testing tools? This is the right time to switch to Python. Packed with many reverse engineering and exploitation libraries, Python is a great language to learn if you want a secure execution of all your information security tasks.
Starting from scratch this course will enable you to all the latest tools and techniques available for Python penetration testing.
This course …
Shop
Showing 1369–1377 of 1502 resultsSorted by latest