Security , Shop
SANS ICS410: ICS/SCADA Security Essentials (PDF-MP3-LAB)
ICS410: ICS/SCADA Security Essentials provides a foundational set of standardized skills and knowledge for industrial cybersecurity professionals. The course is designed to ensure that the workforce involved in supporting and defending industrial control systems is trained to keep the operational environment safe, secure, and resilient against current and emerging cyber threats.
HOMEPAGE – https://www.sans.org/cyber-security-courses/ics-scada-cyber-security-essentials/
Our Price: $25
Security , Shop
The Beginner Malware Analysis Course
Designed for beginners looking to start their journey into the world of Malware Analysis, as well as those wanting to improve their skills.
HOMEPAGE – https://0verfl0w.podia.com/view/courses/malware-analysis-course
Original Price: $52
Our Price: $8
Security , Shop
Maldev Academy
Maldev Academy is a comprehensive malware development course that focuses on x64 malware development, providing knowledge from basic to advanced level. The course is primarily designed for individuals in offensive security, but it also caters to beginners who have no prior experience in malware development.
HOMEPAGE – https://maldevacademy.com/
Original Price: $249
Our Price: $20
Security , Shop
ITU – Certified Ethical Hacker (CEH) v12
Certified Ethical Hacker v12 is the latest iteration of EC-Council’s Certified Ethical Hacker v12 series. In this course you will research, discover and scan targets, analyze vulnerabilities and test attack methods and tools. The focus of this course is to solve the challenge of breaking into a target network, collect evidence of success, and escape unnoticed. Every lesson and topic …
Security , Shop
SANS FOR528: Ransomware for Incident Responders (PDF-LAB)
Ransomware attackers have become more sophisticated, and their techniques constantly evolve. It is a threat that requires an immediate response, especially in the enterprise. FOR528: Ransomware for Incident Responders covers the entire life cycle of an incident, from initial detection to incident response and postmortem analysis. While there is no way to prepare for every scenario possible, our course uses …
Security , Shop
HackersArise – Getting Started Bug Bounty Hunting
Hackers Arise was developed solely to help those who are interested in a career in cyber security. We will have tutorials on all forms of hacking, digital forensics, Linux, information security and just about any subject related to cyber security.
HOMEPAGE – https://www.hackers-arise.com/
Our Price: $6
Networking , Security
Implementing Check Point Firewall Advanced – Part I & Part II
As cyber-attacks become increasingly evasive, more controls are added, making security more complicated and tedious to the point that user workflows are affected. Not any longer with Check Point. Check Point provides customers of all sizes with the latest data and network security protection in an integrated next-generation threat prevention platform, reducing complexity and …
Security , Shop
Host & Network Penetration Testing: System/Host Based Attacks
The ability to exploit host-based vulnerabilities is an important skill set to master on your journey to becoming a skilled penetration tester. In this course, you will learn about the various services, protocols, and vulnerabilities in both Windows and Linux systems and how they can be exploited. You will also learn about the various …
Security , Shop
Computer Forensics Best Practices
There are five main components to computer forensics these being: identification; collection; preservation; analysis and presentation; of computer forensic evidence and each one of these components is important on its own. The underlying concept in computer forensics is to ensure limited or no handling of the original evidence and to make certain all the steps are followed to satisfy the …
Security
Showing 163–171 of 544 results