Showing 316–324 of 1061 results

  • Networking , Security

    Implementing Check Point Firewall Advanced – Part I & Part II

    As cyber-attacks become increasingly evasive, more controls are added, making security more complicated and tedious to the point that user workflows are affected. Not any longer with Check Point. Check Point provides customers of all sizes with the latest data and network security protection in an integrated next-generation threat prevention platform, reducing complexity and …

  • Security , Shop

    Host & Network Penetration Testing: System/Host Based Attacks

    The ability to exploit host-based vulnerabilities is an important skill set to master on your journey to becoming a skilled penetration tester. In this course, you will learn about the various services, protocols, and vulnerabilities in both Windows and Linux systems and how they can be exploited. You will also learn about the various …

  • Security , Shop

    Computer Forensics Best Practices

    There are five main components to computer forensics these being: identification; collection; preservation; analysis and presentation; of computer forensic evidence and each one of these components is important on its own. The underlying concept in computer forensics is to ensure limited or no handling of the original evidence and to make certain all the steps are followed to satisfy the …

  • Linux & IT , Shop

    Azure PowerShell: The Ultimate Beginners Course

    Dive into sixteen (16) hours of “zero to hero” Azure PowerShell training so you can hit the ground running. Delivered by Microsoft MVPs Mike Pfeiffer, Tim Warner, and Jeff Hicks.

     

    HOMEPAGE – https://ine.com/learning/courses/azure-power-shell-the-ultimate-beginners-course

     

    Our Price: $6
  • Shop , Trading & Marketing

    Trading Framework – Profile Trading Mastery

    Learn the Most COMPLETE Auction Market Theory and Market Profile Trading Strategy that Helps Provide a Solid Structured Approach to Discretionary Trading.

    In our flagship Online Course, Kam Dhadwar of TheTradingFramework.com shares with you his most complete program to date. You will learn ALL the concepts that you need to understand in order to apply “The Trading Framework” most effectively and …

  • Security , Shop

    Android Security for Absolute Beginners

    Mobile devices have become part of our daily life and routine. Their use tremendously increased over the last couple of years, so that they have become ubiquitous. Given this fact, the number of malicious mobile applications is tremendously increasing. If you work in cybersecurity, it is imperative to expand your skillset on how to understand and analyze mobile malware.

    This course …

  • Programming , Shop

    Testing: The Complete Developer’s Guide

    The most comprehensive, all-in-one software testing course online. Learn everything from unit testing to API back-end testing to E2E testing and everything in between using JavaScript, Python, React, Node, Rust, Angular, Vue + more so that you can become a top-level Developer in 2023!

     

    HOMEPAGE – https://zerotomastery.io/courses/software-testing-course/

     

    Our Price: $5
  • Networking , Security

    Managing Check Point Firewalls

    As cyber attacks become increasingly evasive, more controls are added, making security more complicated and tedious to the point that user workflows are affected. Not any longer with Check Point. Check Point provides customers of all sizes with the latest data and network security protection in an integrated next generation threat prevention platform, reducing complexity and lowering the total cost …

  • Security , Shop

    Web Hacking Black Belt Edition

    Much like our popular Advanced Infrastructure Hacking class, this class talks about a wealth of hacking techniques to compromise web applications, APIs, cloud components and other associated end-points. This class focuses on specific areas of appsec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). The class allows attendees to practice some neat, new and ridiculous hacks …