Programming , Shop
UPGRADING TO .NET CORE FROM START TO FINISH
.NET Core 3.0 is here. It is time to get your projects upgraded from the .NET Framework to .NET Core before they fall further behind.
To make this as real-world as possible, we will be taking the Tournament Tracker application with all three user interfaces and using it as a starting point for our upgrading. The project is built upon .NET …
Security , Shop
Software Ethical Hacking – How to Crack Software Legally
If you want to learn how to crack software legally, the fun and easy way like playing a computer game, then this course is for you.
What you’ll learn
How to crack software serial number keys
Remove Nag Screen Reminders asking you to register
Convert Trial Software to Fully Functional Software
Extend 30-day Trial Period Software
Learn Reverse Engineering and Assembly Language
Protect your software by learning how …Shop , Trading & Marketing
Zarak C – The AI Copywriting Accelerator
That means you’ll be able to stop worrying about where you’re going to hire your next employee from…
As you don’t even NEED to hire employees to scale your client base.
You’ll start to relax, and run your service business from a place of abundance and profit rather than scarcity and loss.
And just imagine how it’ll feel, when 3 months …
Animation & Graphics , Shop
Graphic Design Masterclass – Learn GREAT Design
Are you intimidated by learning photoshop, illustrator or InDesign and want to learn through practical real world projects? Than This class will be for you!
We will extensively review Typography, color theory, layout and composition, how to use photos in design, photo manipulations and editing and magazine layout design, branding and logo design just to name a few.
We also learn the basics of Adobe Photoshop, illustrator and InDesign and do projects …
Security , Shop
SANS SEC510: Public Cloud Security: AWS, Azure, and GCP (PDF-LAB)
SEC510: Public Cloud Security: AWS, Azure, and GCP is an in-depth analysis of the security of managed services for the Big 3 cloud providers: Amazon Web Services, Azure, and Google Cloud Platform. Students will leave the course confident that they have the knowledge they need when adopting services and Platform as a Service (PaaS) offerings in each cloud. Students will …
Security , Shop
SANS SEC467: Social Engineering for Security Professionals (Ebooks)
SEC467 will prepare you to add social engineering skills to your security strategy. In this course, you will learn how to perform recon on targets using a wide variety of sites and tools, create and track phishing campaigns, and develop media payloads that effectively demonstrate compromise scenarios.
HOMEPAGE – https://www.anonymz.com/?https://www.sans.org/cyber-security-courses/social-engineering-security-professionals/
Our Price: $5
Security , Shop
SANS FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics (PDF-VID-LAB)
Threat hunting and Incident response tactics and procedures have evolved rapidly over the past several years. Your team can no longer afford to use antiquated incident response and threat hunting techniques that fail to properly identify compromised systems. The key is to constantly look for attacks that get past security systems, and to catch intrusions in progress, rather than after …
Security , Shop
SANS SEC588: Cloud Penetration Testing (PDF-VID-LAB)
SEC588 will equip you with the latest in cloud focused penetration testing techniques and teach you how to assess cloud environments. In this course we dive into topics like cloud based microservices, in-memory data stores, serverless functions, Kubernetes meshes, and containers, as well as identifying and testing in cloud-first and cloud-native applications. You will also learn specific tactics for penetration …
Security , Shop
SANS SEC552: Bug Bounties and Responsible Disclosure (PDF-VID-LAB)
SANS SEC552 teaches students how to apply modern attack techniques, inspired by real-world bug bounty case studies. The course will teach pen testers how to discover and responsibly disclose tricky, logic-based application flaws that automated scanning tools do not reveal.
Pen testers and security researchers face the challenge of discovering and weaponizing complicated vulnerabilities in order to properly perform security …
Shop
Showing 244–252 of 1048 results