Showing 379–387 of 1061 results

  • Security , Shop

    Cloud Security Training for Software Developers

    This intermediate Cloud Security Training for Software Developers training prepares learners to code and develop inside the cloud safely with a fundamental understanding of cloud security fundamentals.

    The cloud was supposed to be the answer to everyone’s problems and usher in a golden age. The cloud has certainly done a lot, but at the same time it’s also introduced …

  • Security , Shop

    Hacker Tools, Techniques, and Incident Handling (SEC504)

    This intermediate SEC504 training prepares learners to detect and respond to threats that your company will inevitably face in the digital realm, deploying a dynamic response according to the attack.

    It’s a cliche to claim that the best defense is a strong offense, but in the case of digital security it’s a cliche that’s as true as it’s ever …

  • Networking , Security

    CCNP Security Cisco Identify Services Engine SISE 300-715 Complete Video Course (Video Training)

    CCNP Security Management (SISE) 300-715 Complete Video Course focuses on a blend of the real-world experience and best practices mixed with the requirements for the CCNP SISE 300-715 exam. The goal of the course is to not only cover the objectives for the SISE 300-715, but also provide a solid learning resource for mastering key concepts regarding planning and delivering …

  • Programming , Shop

    Windows System Programming: Memory Management

    This course focuses on the fundamentals of memory management. We will learn how to use windows API to interact with and manipulate memory. Once we have covered the fundamentals, we will look at memory-mapped files which is a very powerful feature of windows for working with memory.

     

    HOMEPAGE – https://www.pentesteracademy.com/course?id=59

     

    Our Price: $5
  • Security , Shop

    Become an Incident Handler

    In this Career Path, you will learn the incident response process, from building an incident response kit and developing an incident response team, to identifying, containing, and recovering from incidents. We then steer away from a traditional “defensive-only” approach to introduce you to the attacker’s world.

     

    HOMEPAGE – https://www.cybrary.it/catalog/career-path/incident-handler/

     

    Our Price: $7
  • Security , Shop

    Automating Threat Response with Microsoft Sentinel

    In this course, Automating Threat Response with Microsoft Sentinel, you’ll learn what Microsoft Sentinel is and how it can help enable end-to-end security operations. First, you’ll explore Microsoft Sentinel’s core features and concepts. Next, you’ll examine how to configure Microsoft Sentinel to connect to your data and perform the necessary investigations. Finally, you’ll discover how to use Microsoft Sentinel to detect …

  • Networking , Security

    Cisco CCNP Security SNCF (Exam 300-710)

    When it comes to Cisco security solutions, Cisco Firepower devices have become extremely popular tools. This is especially true if you work in an enterprise environment and need simplified but robust firewall management. In this course from ITProTV, learn how to master advanced security skills to prepare for the Cisco CCNP Securing Networks with Cisco Firepower (SNCF) 300-710 exam.

     

    HOMEPAGE – …

  • Programming , Shop

    C# 10

    C# is the most popular language to build .NET applications today. It’s part of the .NET ecosystem, which offers developers all the tools, languages and frameworks to create all types of applications including web, cloud, desktop and mobile.

    This path will take you from the very beginning, with no C# knowledge, all the way to being an expert in the language. …

  • Security , Shop

    EXP-312: Advanced macOS Control Bypasses (PDF-VID)

    Advanced macOS Control Bypasses (EXP-312) is our first macOS security course. It’s an offensive logical exploit development course for macOS, focusing on local privilege escalation and bypassing the operating system’s defenses. EXP-312 is an advanced course that teaches the skills necessary to bypass security controls implemented by macOS, and exploit logic vulnerabilities to perform privilege escalation on macOS systems.

     

    HOMEPAGE – …