Showing 1–9 of 766 results

  • Security , Shop

    Hackers Arise – Cybersecurity/Hacker Starter Bundle

    With this package, you can master Linux and Python, learn the basics of networking, pass the CWA and Security+ certification exams, learn to hack Wi-Fi and take the first steps to becoming a master hacker!

    This package includes;
    1. Linux Basics for Hackers v2 companion videos ($99 value)
    2. Certified WhiteHat Associate (CWA) Prep v2 course ($99 value)
    3. Getting Started Becoming a Master …

  • Security , Networking

    FortiGate Network Security Engineer

    This learning path consolidates all INE’s FortiGate content into a single trackable path you can follow to your success! The series focuses on security technologies and solutions supported by Fortinet’s flagship next-generation firewall system – FortiGate. It covers fundamental and advanced concepts important for every FortiGate Administrator, System/Support Engineer, and Fortinet Network Security Expert (NSE) student – including …

  • Linux & IT , Shop

    Shell Scripting with Bash

    Have you wanted to improve your Linux and Bash Scripting skills but don’t know where to start? Due to the proliferation of Linux, this is an increasingly important skill to have.

    This course is the best solution because it will take you from beginner level to Linux Power User. Thus, laying the groundwork to become a Linux Systems Administrator and much …

  • Shop , Networking

    Palo Alto Networks 10.0 Firewall

    Do you want to learn how to block certain applications like BitTorrent, Skype, to Google Mail? Do you want to learn how to decrypt a secure web page a user may access to inspect it further? Do you want to learn how to block certain files uploaded towards the Internet? Do you want to setup your firewall to dynamic block …

  • Shop , Security

    iOS Application Security

    Can you guess an attack surface, which is constantly moving, connecting to several different wifi, stores user critical information and is still highly insecure? Well the answer is, Mobile applications. With almost 15% market share, iOS devices and iOS applications handle huge amount of user data. This requires these apps to be very secure and strong in terms of security.

    Though, …

  • Shop , Programming & Designing

    Modern JavaScript From The Beginning 2.0

    This is a 37+ hour in-depth course that will take you from the absolute beginning of JavaScript, learning about data types, functions and loops to learning DOM manipulation, asynchronous JS with promises, async/await and much more. You will even learn how to write unit tests for algorithms. We go into how JavaScript works under the hood including execution context, the …

  • Shop , Security

    Windows Post Exploitation w/ Kyle Avery

    Kyle Averystarted with Black Hills Information Security (BHIS) as an intern in October 2020 and was hired on as a full-time Penetration Tester in December 2020. When he is not on a test, he enjoys working on different R&D projects. Kyle says that he had always dreamed of working for BHIS because of community involvement, and the wealth of knowledge …

  • Security , Shop

    CyberChef for Security Analysts –

    CyberChef for Security Analysts will teach you how to use CyberChef to perform common data manipulation, transformation, deobfuscation, and extraction techniques using real security data*. This isn’t just a simple tutorial, you’ll work through diverse exercises using real-world security data to build a toolkit of techniques.

    Simply put, CyberChef for Security Analysts is an example-driven master class on dealing with the …

  • Shop , Linux & IT

    PowerShell for InfoSec

    PowerShell is an excellent cross-platform shell for executing commands and scripts on both local and remote machines. It is installed on Windows by default and is widely used by both network defenders and attackers. This course will cover key PowerShell concepts that both blue and red teamers should understand including logging, credential management, remote administration, security bypass techniques and popular …