Showing 712–720 of 1061 results

  • Security , Shop

    Network Pentesting

    A non-exhaustive set of topics covered include:

    • Pentesting Routers
    • Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
    • SNMP attacks
    • Bypassing Firewalls
    • Payloads and Shells
    • HTTP/HTTPS tunneling
    • Port Forwaring, Pivoting, Reverse Connects
    • Privilege Escalation and UAC bypass
    • Hash Dumping and Mimikatz
    • Windows Sessions, Stations and Desktops
    • Impersonation attacks
    • WMIC post exploitation
    • Hidden bind shells
    • Bitsadmin
    • Browser Password Recovery
    • PAC Attacks
    • DNS …
  • Security , Shop

    Learn Cloud Security Architecture

    The Cloud Security Architecture skill path teaches you enterprise security architecture concepts related to the cloud, including cloud infrastructure, data and application security.

    This learning path provides an in-depth look at cloud security architecture. As you progress through 17 courses, you’ll build your knowledge and skills around cloud infrastructure and design, cloud data and application security, network security, secure storage, cryptography, …

  • Programming , Shop

    Basic Django Roadmap

    Django is a Python framework for web development. It has a huge community and is backed by large companies such as Instagram and Pinterest. Django is extremely good for quickly building scalable and secure web apps.

     

    HOMEPAGE – https://www.anonymz.com/?https://learn.justdjango.com/roadmaps/django-basic

     

    Our Price: $5
  • Animation & Graphics , Shop

    EFFICIENT TECHNIQUES FOR BUILDING 3D ENVIRONMENTS

    Learn a variety of efficient industry-proven techniques for creating a range of 3D environment styles in this 3-hour workshop by James A.J. Miller, Environment Artist at DreamWorks Animation.

    The workshop begins with a demonstration of a large 3D city environment in a desert setting. This type of scene offers a great opportunity for James to cover the importance of Triplanar materials, …

  • Shop , Trading & Marketing

    CryptoBusy Pro Trader Course

    Your complete guide on how to trade crypto.

    Josh and Tom have a combined 10 years experience trading the Forex and Crypto Markets. Together with their experience will take you on a Crypto Trading journey to develop your trading game to take it to the next level!

    Basics

    Taking it from the start. This will cover all the necessary …

  • Programming , Security

    Python for Pentesters

    This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administrators who want to learn to automate tasks or go beyond just using ready made tools. We will be covering topics in system security, network security, attacking web applications and services, exploitation …

  • Networking , Security

    Cisco Certified CyberOps Associate

    The Cisco Certified CyberOps Associate Learning Path prepares you to begin a career working with associate-level cybersecurity analysts within security operations centers. You’ll gain an understanding of basic cybersecurity principles, build a foundation of knowledge and develop your core skills.

     

    HOMEPAGE – https://www.infosecinstitute.com/skills/learning-paths/ccna-cyber-ops/

     

    Our Price: $5
  • Security , Shop

    Cloud Service Provider (CSP) Security Features

    Explore the ins and outs of choosing and working with AWS, Azure and GCP. For each cloud provider, we will review the native security controls they offer across several security domains, discuss the drawbacks of each cloud provider and look at areas to consider when working with that provider and solutions you should have in mind when moving to that …

  • Security , Shop

    Cybersecurity Audit Fundamentals

    The Cybersecurity Audit Learning Path helps you get to grips with the controls implemented by the organization to reduce the risk to confidentiality, integrity and availability down to an acceptable level. This path will help to identify your role as an auditor, why governance in security is important to the organization and how cybersecurity operates, and touch on some additional …