• Shop , Security

    Cybrary – Penetration Testing and Ethical Hacking

    If you are considering working in the cyber security industry, then this training will benefit you greatly. With Cybrary’s online ethical hacking course, you will learn how to protect users from cyber attackers by becoming an ethical hacker and learning to exploit networks yourself.

    As the internet continues to advance, cybercrimes do as well. Criminals no longer need to leave their …

  • Shop , Linux & IT

    AZ-900 Microsoft Azure Fundamentals

    In early 2019, Microsoft developed the AZ-900 Microsoft Azure Fundamentals certification as an entry point for all students keen to begin navigating their way around the Azure cloud platform.

    As cloud enthusiasts, we want to ensure that you have all the teaching and resources available to introduce you to Microsoft Azure. As the second most commonly used cloud vendor, it’s becoming …

  • Shop , Security

    CompTIA Security+

    This learning path builds on your existing networking skills and prepares you to earn your Security+, one of the most popular entry-level cybersecurity certifications. You’ll learn the foundations of information security as you progress through 10 courses tied to the six Security+ certification exam objectives. Upon completion, you’ll be prepared to earn your Security+ certification and have an established base …

  • Shop , Security

    Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series)

    Enterprise Penetration Testing and Continuous Monitoring LiveLessons, part of The Art of Hacking video series, provides step-by-step, real-life complex scenarios of performing security assessments (penetration testing) of enterprise networks using internal/external reconnaissance, social engineering, and network and vulnerability scanning. You also learn how to perform web app testing, internal network testing, privilege escalation, password cracking, and data exfiltration to probe …

  • Shop , Animation & Graphics

    Digital Landscapes Photoshop Video Training

    Redoaune Naouri presents: Digital Landscapes – an A-to-Z guide where you will learn how to create epic fantasy environments in Photoshop…

    In this course you’ll discover the advanced compositing / processing techniques for creating sweeping landscapes, depth of field, atmospheric effects, and beautiful colours.

    With stunning environments, you’re GUARANTEED to take your Photoshop composites to the next level!!

     

    HOMEPAGE – http://www.neo-stock.com/digital-landscapes-photoshop-video-training

     

    Original Price: …

  • Shop , Security

    Certified Penetration Testing Engineer (CPTE)

    This Official Mile2® cyber security certification training series covers everything you need to know about becoming a Certified Penetration Testing Engineer. Students will learn about logistics of pen testing, Linux fundamentals, information gathering, detecting live systems, enumeration, vulnerability assessments, malware going undercover, Windows hacking, hacking UNIX/Linux, advanced exploitation techniques, pen testing wireless networks, networks, sniffing and IDS, injecting the database, …

  • Shop , Security

    EC-Council – Certified Penetration Testing Professional | CPENT (PDF-Videos)

    EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT …

  • Shop , Security

    Cybrary – Identifying Web Attacks Through Logs

    This course will review web application infrastructure, web servers, and the logs associated with them. We will also simulate 10 attack scenarios and identify the attack through logs that are generated by the web server

    An Akamai Report from 2018 described SQLi (SQL Injection), LFI (Local File Injection) and XSS (Cross-Site Scripting) as the most common web attacks. (https://blogs.akamai.com/2018/06/summer-soti—web-attacks.html)

    There are multiple …

  • Shop , Security

    Learn Computer Forensics

    This learning path is designed to build a foundation of knowledge and skills around computer forensics. As you progress through 13 courses, you’ll learn about conducting forensics on a variety of platforms and devices, including networks, file and operating systems, memory, email and browsers. Upon completion, you’ll have a base of computer forensics knowledge to carry over to your job …