Showing 442–450 of 1048 results

  • Security , Shop

    EC-Council – Cybersecurity Risk Management (PDF)

    This risk management course is specifically designed to guide a CISO in defining and implementing a risk management approach within an IS program. The course introduces the student to the most common approaches and practices used by organizations worldwide. It is not intended to cover risk outside of the IS enterprise (including financial and business risks).

     

    HOMEPAGE – https://iclass.eccouncil.org/risk-management-approach-and-practices-rm/

     

    Our Price: …

  • Security , Shop

    AWS Certified Security Specialty 2023

    AWS Certified Security – Specialty certification is one of the widely recognized security certifications across the industry. With the number of security breaches increasing every year, there is a huge demand for individuals who understands the security side of things, specifically Cloud-based Infrastructures.

    This course is specially designed for the aspirants who intend to give the AWS Certified Security Specialty 2023 …

  • Security , Shop

    SOC-200: Security Operations and Defensive Analysis (PDF-VID)

    Learn the foundations of cybersecurity defense with Security Operations and Defensive Analysis (SOC-200), a course designed for job roles such as Security Operations Center (SOC) Analysts and Threat Hunters. Students gain hands-on experience with a SIEM, identifying and assessing a variety of live, end-to-end attacks against a number of different network architectures.

     

    HOMEPAGE – https://www.offensive-security.com/courses/soc-200/

     

    Our Price: $50
  • Security , Shop

    Web Security Academy Series

    The course uses a mixture of both theory and practice. The theory component covers the background knowledge that is required in order to gain an advanced understanding of the technical details behind a specific vulnerability class. The practical component makes use of PortSwigger’s Web Security Academy labs to get real world hands on experience in hacking applications. As can be …

  • Security , Shop

    Hands-on Android Security

    Empowering the world with a million applications and users, Android is one of the most preferred mobile operating systems. Rise in number of users and devices opens the opportunity for threats, which can lead to security breaches.

    This course focuses on the practical aspect of penetration testing. The course will begin with teaching you the core concepts of Android OS, hardware …

  • Programming , Shop

    Django: Getting Started Course

    Django is one of the most popular web frameworks for coding in Python. It includes libraries for: templating HTML content, URL routing, views, a robust Object Relational Model (ORM) for mapping classes to database queries, HTML form management, a built-in administrative tool, and much more. This course teaches you how to build your first Django project and guides you through …

  • Linux & IT , Networking

    ITProTV – CompTIA A+ Core 1 (220-1101) & CompTIA A+ Core 2 (220-1102)

    CompTIA A+ certified professionals are proven, problem solvers. They support today’s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today’s digital world.

     

    HOMEPAGE – https://www.itpro.tv/courses/comptia/comptia-a-core-1-220-1101/

    https://www.itpro.tv/courses/comptia/comptia-a-core-2-220-1102/

     

    Our Price: $7
  • Security , Shop

    OAuth and OIDC Essentials

    OAuth and OIDC (OpenID Connect) have become the de facto protocol for Authentication and Authorization on the modern web. Nearly every application you use depends on these technologies, particularly for Single-Sign On and Social Login. Despite their ubiquity, OAuth and OIDC can get confusing, especially with the multiple flows, models and use-cases.

    In this course, we’re going to start with the …

  • Security , Shop

    JWT Jiu-Jitsu

    For any modern web application, authentication and authorization are key components of the security posture. In recent years, JSON Web Token (JWT) has become one of the leading technology standards used to secure and protect web apps of all kinds. Loved by many but hated by cryptographers, JWT is used extensively in OAuth, OIDC, Kubernetes, and other distributed web services …