Showing 163–171 of 544 results

  • Security , Shop

    SANS ICS410: ICS/SCADA Security Essentials (PDF-MP3-LAB)

    ICS410: ICS/SCADA Security Essentials provides a foundational set of standardized skills and knowledge for industrial cybersecurity professionals. The course is designed to ensure that the workforce involved in supporting and defending industrial control systems is trained to keep the operational environment safe, secure, and resilient against current and emerging cyber threats.

     

    HOMEPAGE – https://www.sans.org/cyber-security-courses/ics-scada-cyber-security-essentials/

     

    Our Price: $25
  • Security , Shop

    The Beginner Malware Analysis Course

    Designed for beginners looking to start their journey into the world of Malware Analysis, as well as those wanting to improve their skills.

     

    HOMEPAGE – https://0verfl0w.podia.com/view/courses/malware-analysis-course

     

    Original Price: $52
    Our Price: $8
  • Security , Shop

    Maldev Academy

    Maldev Academy is a comprehensive malware development course that focuses on x64 malware development, providing knowledge from basic to advanced level. The course is primarily designed for individuals in offensive security, but it also caters to beginners who have no prior experience in malware development.

     

    HOMEPAGE – https://maldevacademy.com/

     

    Original Price: $249
    Our Price: $20
  • Security , Shop

    ITU – Certified Ethical Hacker (CEH) v12

    Certified Ethical Hacker v12 is the latest iteration of EC-Council’s Certified Ethical Hacker v12 series. In this course you will research, discover and scan targets, analyze vulnerabilities and test attack methods and tools. The focus of this course is to solve the challenge of breaking into a target network, collect evidence of success, and escape unnoticed. Every lesson and topic …

  • Security , Shop

    SANS FOR528: Ransomware for Incident Responders (PDF-LAB)

    Ransomware attackers have become more sophisticated, and their techniques constantly evolve. It is a threat that requires an immediate response, especially in the enterprise. FOR528: Ransomware for Incident Responders covers the entire life cycle of an incident, from initial detection to incident response and postmortem analysis. While there is no way to prepare for every scenario possible, our course uses …

  • Security , Shop

    HackersArise – Getting Started Bug Bounty Hunting

    Hackers Arise was developed solely to help those who are interested in a career in cyber security. We will have tutorials on all forms of hacking, digital forensics, Linux, information security and just about any subject related to cyber security.

     

    HOMEPAGE – https://www.hackers-arise.com/

     

    Our Price: $6
  • Networking , Security

    Implementing Check Point Firewall Advanced – Part I & Part II

    As cyber-attacks become increasingly evasive, more controls are added, making security more complicated and tedious to the point that user workflows are affected. Not any longer with Check Point. Check Point provides customers of all sizes with the latest data and network security protection in an integrated next-generation threat prevention platform, reducing complexity and …

  • Security , Shop

    Host & Network Penetration Testing: System/Host Based Attacks

    The ability to exploit host-based vulnerabilities is an important skill set to master on your journey to becoming a skilled penetration tester. In this course, you will learn about the various services, protocols, and vulnerabilities in both Windows and Linux systems and how they can be exploited. You will also learn about the various …

  • Security , Shop

    Computer Forensics Best Practices

    There are five main components to computer forensics these being: identification; collection; preservation; analysis and presentation; of computer forensic evidence and each one of these components is important on its own. The underlying concept in computer forensics is to ensure limited or no handling of the original evidence and to make certain all the steps are followed to satisfy the …