Linux & IT , Shop
Red Hat Certified Specialist in Containers and Kubernetes (EX180) and OpenShift Administration (EX280)
Red Hat Certified Specialist in Containers and Kubernetes Complete Video Course: Red Hat EX180 provides an in-depth analysis of the core objectives and topics in the Red Hat EX180 exam so you can get started with containers on Red Hat Enterprise Linux and OpenShift, the Red Hat Kubernetes distribution, while also preparing for the Red Hat exam EX180. Topics include managing …
Linux & IT , Shop
Advanced Analysis with Power BI
Advanced Analysis with Power BI examines various methods for teasing out insights from data using statistical methodologies and presenting significant findings in visually compelling formats. The course starts with basic statistics such as standard deviation and then progresses to AI and machine learning analysis where Power BI does all the heavy lighting allowing the user to investigate and dynamically explore …
Security , Shop
Red Team Ops
Red Team Ops is an online course that teaches the basic principals, tools and techniques, that are synonymous with red teaming.
Students will first cover the core concepts of adversary simulation, command & control, and how to plan an engagement. They will then learn about each stage of the attack lifecycle from initial compromise, to full domain takeover, data hunting, …
Security , Shop
Cracking Software Practicals (CSP)
Real software are commercial proprietary software. We are doing this for educational purposes and not to harm software developers. This skill and knowledge benefits developers in that they are better able to secure their software. The concept is similar to ethical hacking – the only way to defend against hackers is to know how hackers break in. Similarly, for software …
Networking , Shop
Cisco OSPF Troubleshooting Training
This intermediate Cisco OSPF Troubleshooting training prepares learners to identify the source of an OSPF error on a Cisco router and implement the appropriate steps to get your OSPF functionality restored.
The Open Shortest Path First protocol is a powerful and often complicated protocol. When it’s working properly, an autonomous system’s data can fly through its various nodes and routers. When …
Linux & IT , Programming
x86_64 Assembly Language and Shellcoding on Linux
This course focuses on teaching the basics of 64-bit assembly language for the x86_64 family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we will look at writing shellcode, encoders, decoders, crypters and other advanced low level applications.
HOMEPAGE – https://www.pentesteracademy.com/course?id=7
Our Price: $3
Security , Shop
Windows Red Team Lab
This is a companion course for our Windows Red Team Lab. It does however touch upon interesting concepts you can learn when doing pentests on a Windows Active Directory environment.
HOMEPAGE – https://www.pentesteracademy.com/course?id=44
Our Price: $3
Security , Shop
Exploiting Simple Buffer Overflows on Win32
In this course, we will look at how to exploit Simple Buffer Overflows on Win32 systems. This is an introductory course and starts from the very basics of exploitation and is beginner friendly. We will be taking over 10+ real world and staged application examples to illustrate the concepts. It is important to note that this introductory course will be …
Programming , Shop
HTML + CSS Basics – Ultimate Courses
Learn modern web fundamentals with the latest HTML5 and CSS3 techniques and practices. Fill all your knowledge gaps and build a real website from scratch.
HOMEPAGE – https://ultimatecourses.com/learn/html-css-basics
Original Price: $129
Our Price: $5
Shop
Showing 694–702 of 1054 results