Networking , Security
Implementing Check Point Firewall Advanced – Part I & Part II
As cyber-attacks become increasingly evasive, more controls are added, making security more complicated and tedious to the point that user workflows are affected. Not any longer with Check Point. Check Point provides customers of all sizes with the latest data and network security protection in an integrated next-generation threat prevention platform, reducing complexity and …
Security , Shop
Host & Network Penetration Testing: System/Host Based Attacks
The ability to exploit host-based vulnerabilities is an important skill set to master on your journey to becoming a skilled penetration tester. In this course, you will learn about the various services, protocols, and vulnerabilities in both Windows and Linux systems and how they can be exploited. You will also learn about the various …
Security , Shop
Computer Forensics Best Practices
There are five main components to computer forensics these being: identification; collection; preservation; analysis and presentation; of computer forensic evidence and each one of these components is important on its own. The underlying concept in computer forensics is to ensure limited or no handling of the original evidence and to make certain all the steps are followed to satisfy the …
Linux & IT , Shop
Azure PowerShell: The Ultimate Beginners Course
Dive into sixteen (16) hours of “zero to hero” Azure PowerShell training so you can hit the ground running. Delivered by Microsoft MVPs Mike Pfeiffer, Tim Warner, and Jeff Hicks.
HOMEPAGE – https://ine.com/learning/courses/azure-power-shell-the-ultimate-beginners-course
Our Price: $6
Shop , Trading & Marketing
Trading Framework – Profile Trading Mastery
Learn the Most COMPLETE Auction Market Theory and Market Profile Trading Strategy that Helps Provide a Solid Structured Approach to Discretionary Trading.
In our flagship Online Course, Kam Dhadwar of TheTradingFramework.com shares with you his most complete program to date. You will learn ALL the concepts that you need to understand in order to apply “The Trading Framework” most effectively and …
Security , Shop
Android Security for Absolute Beginners
Mobile devices have become part of our daily life and routine. Their use tremendously increased over the last couple of years, so that they have become ubiquitous. Given this fact, the number of malicious mobile applications is tremendously increasing. If you work in cybersecurity, it is imperative to expand your skillset on how to understand and analyze mobile malware.
This course …
Programming , Shop
Testing: The Complete Developer’s Guide
The most comprehensive, all-in-one software testing course online. Learn everything from unit testing to API back-end testing to E2E testing and everything in between using JavaScript, Python, React, Node, Rust, Angular, Vue + more so that you can become a top-level Developer in 2023!
HOMEPAGE – https://zerotomastery.io/courses/software-testing-course/
Our Price: $5
Networking , Security
Managing Check Point Firewalls
As cyber attacks become increasingly evasive, more controls are added, making security more complicated and tedious to the point that user workflows are affected. Not any longer with Check Point. Check Point provides customers of all sizes with the latest data and network security protection in an integrated next generation threat prevention platform, reducing complexity and lowering the total cost …
Security , Shop
Web Hacking Black Belt Edition
Much like our popular Advanced Infrastructure Hacking class, this class talks about a wealth of hacking techniques to compromise web applications, APIs, cloud components and other associated end-points. This class focuses on specific areas of appsec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). The class allows attendees to practice some neat, new and ridiculous hacks …
Shop
Showing 316–324 of 1061 results