Showing 226–234 of 1048 results

  • Shop , Trading & Marketing

    Tube Freedom

    How I Make $100,000+ On YouTube WITHOUT SHOWING MY FACE Using YouTube Automation.

     

    HOMEPAGE – https://adamdelduca.gumroad.com/l/tubefreedom

     

    Original Price: $150
    Our Price: $25
  • Networking , Shop

    CCNP and CCIE Enterprise Core ENCOR 350-401, 2nd Edition

    CCNP and CCIE Enterprise Core ENCOR 350-401 Complete Video Course, Second Edition is a comprehensive training course that has been incorporated with the following changes to accommodate the ENCORE 1.1 Syllabus: Routing topics include EIGRP, Policy Based Routing, and newer IOS XE CLI commands. The Quality of Service (QoS) lesson has expanded from just theory and now includes the Modular QoS …

  • Security , Shop

    SANS FOR498: Battlefield Forensics & Data Acquisition

    FOR498, a digital forensic acquisition training course, provides the necessary skills to identify the many and varied data storage mediums in use today, and how to collect and preserve this data in a forensically sound manner despite how and where it may be stored. It covers digital acquisition from computers, portable devices, networks, and the cloud. It then teaches the …

  • Linux & IT , Programming

    Introduction to Bash, VIM & Regex

    In this course James Halliday (Substack), author with more than 750 packages at npm, walks you through an illuminating guide to everything Unix! You’ll learn how to take control of the Unix command line to write your own tools, automate tasks with shell scripts and the pipeline, compose regular expressions to master search patterns, and easily edit files with the …

  • Linux & IT , Shop

    CBTNuggets – Microsoft Excel (Office 365 & 2021) & Foundational Statistics for Data Analysis with Excel 2022

    Be the Excel guru on your team — someone who can create work schedules. Plan out complex projects. Track the income and expenses for entire companies. Take raw numbers and tell a compelling story.

    Once you’re done with this Microsoft Excel skills training, you’ll know how to create spreadsheets in Excel that let you store data, manipulate data with formulas, and …

  • Security , Shop

    SANS FOR578: Cyber Threat Intelligence (PDF-VID-MP3-LAB)

    Cyber threat intelligence represents a force multiplier for organizations looking to update their response and detection programs to deal with increasingly sophisticated advanced persistent threats. Malware is an adversary’s tool but the real threat is the human one, and cyber threat intelligence focuses on countering those flexible and persistent human threats with empowered and trained human defenders. During a targeted …

  • Security , Shop

    MGT414: SANS Training Program for the CISSP Certification (PDF-VID-MP3)

    MGT414 is fully updated for the May 2021 CISSP exam update! MGT414: SANS Training Program for CISSP Certification is an accelerated review course designed to prepare you to pass the exam. The course prepares students to navigate all types of questions included on the new version of the exam.

    SANS MGT414: SANS Training Program for CISSP® Certification is an accelerated …

  • Security , Shop

    SANS MGT514: Security Strategic Planning, Policy, and Leadership (VID-PDF-MP3)

    This information security course will provide you with the tools to build a cybersecurity strategic plan, an entire IT security policy, and lead your teams in the execution of your plan and policy.

    As security professionals we have seen the landscape change. Cybersecurity is now more vital and relevant to the growth of your organization than ever before. As a …

  • Security , Shop

    SANS SEC503: Network Monitoring and Threat Detection In-Depth (PDF-VID-LAB)

    SEC503: Network Monitoring and Threat Detection In-Depth delivers the technical knowledge, insight, and hands-on training you need to confidently defend your network, whether traditional or cloud-based. You will learn about the underlying theory of TCP/IP and the most used application protocols so that you can intelligently examine network traffic to identify emerging threats, perform large-scale correlation for threat hunting, and …