Showing 217–225 of 1054 results

  • Security , Shop

    SANS ICS515: ICS Visibility, Detection, and Response (PDF-VID-MP3-LAB)

    ICS515: ICS Visibility, Detection, and Response will help you gain visibility and asset identification in your Industrial Control System (ICS)/Operational Technology (OT) networks, monitor for and detect cyber threats, deconstruct ICS cyber attacks to extract lessons learned, perform incident response, and take an intelligence-driven approach to executing a world-leading ICS cybersecurity program to ensure safe and reliable operations. Note: This …

  • Security , Shop

    The Bug Hunter’s Methodology Live Course

    I am thrilled to introduce you to The Bug Hunter’s Methodology LIVE, my masterclass designed for aspiring and seasoned offensive security professionals, including web application security testers, red teamers, and bug bounty hunters.

    The Bug Hunter’s Methodology (TBHM) is a two-day, paid, virtual training that aims to equip you with the latest tools, techniques, and strategies, plus provide …

  • Programming , Security

    Python for Cybersecurity Specialization

    Master Python for a variety of cybersecurity tasks. This Specialization provides an application-driven introduction to using Python for cybersecurity.

    Python is one of the most popular and widely-used programming languages in the world due to its high usability and large collection of libraries. This learning path provides an application-driven introduction to using Python for cybersecurity. Python can …

  • Animation & Graphics , Shop

    Animation Master Course

    Follow my step by step system that I use to teach students eye-catching Animations, even if you are a complete beginner and have never used After Effects before.

    How cool would it be if I could open up After Effects and start creating Animations that looked visually great and my clients loved – all without having to watch endless hours …

  • Programming , Shop

    Modern JavaScript for the Impatient

    Modern JavaScript for the Impatient LiveLessons focuses on how to be productive with JavaScript as it exists today. After reviewing the fundamentals of values, variables, and control flow, the video thoroughly covers functions, objects, and classes. The standard library and the most commonly used tools are also covered, as well as key topics related to asynchronous programming, internationalization, and modules.

     

    HOMEPAGE – …

  • Programming , Shop

    Full Stack for Front-End Engineers, v3

    Learn what it means to become a full-stack engineer. Get hands-on with setting up your own server to build and deploy web applications from scratch. You’ll dive deep into servers, work with the command line, understand networking and security, set up continuous integration and deployment, manage databases, and build containers. Become a well-rounded engineer and gain the confidence that you …

  • Security , Shop

    Privilege Escalation for OSCP and Beyond – Bundle!

    This course teaches privilege escalation in Linux, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (170+), and an intentionally misconfigured Debian VM which can be used by students to practice their own privilege escalation.

    This course teaches privilege escalation in Windows, from basics …

  • Security , Shop

    SANS MGT551: Building and Leading Security Operations Centers (PDF-MP3-VID-LAB)

    Information technology is so tightly woven into the fabric of modern business that cyber risk has become business risk. SOC teams are facing more pressure than ever before to help manage this risk by identifying and responding to threats across a diverse set of infrastructures, business processes, and users. Furthermore, SOC managers are in the unique position of having to …

  • Security , Shop

    SANS FOR526: Advanced Memory Forensics and Threat Detection (PDF-VID)

    FOR526: Memory Forensics In-Depth provides the critical skills necessary for digital forensics examiners and incident responders to successfully perform live system memory triage and analyze captured memory images. The course uses the most effective freeware and open-source tools in the industry today and provides an in-depth understanding of how these tools work. FOR526 is a critical course for any serious …