Showing 973–981 of 996 results

  • Programming , Animation & Graphics

    School of Motion – Design Bootcamp

    Design Bootcamp shows you how to put design knowledge into practice through several real-world client jobs. You’ll create style frames and storyboards while watching typography, composition, and color theory lessons in a challenging, social environment.

    Design is hard work, and designing for Motion is even harder. Not only does your work need to look good as a still, but it also …

  • Security , Shop

    Learn Kali Linux and hack any Android Mobile device

    Most of today Ethical Hacking and Penetration testing courses are focusing on how to compromise computers with Windows and Linux platform while right now most peoples are keeping all their critical data (Emails, Contacts, SMS, Personnel files) on Smart phones and tablet that use different platform like Android and doesn’t have the same layers of security like PC’s and accordingly …

  • Security , Shop

    Practical Threat Hunting

    Practical Threat Hunting is a foundational course that will teach you how to approach threat hunting using a proven, structured, repeatable framework. I created this course to help people figure out what to hunt for, where to find it, and how to look for it.

    Practical Threat Hunting is the course that will teach you to hunt in a way that will never …

  • Animation & Graphics , Shop

    School of Motion – Photoshop and Illustrator Unleashed

    Photoshop and Illustrator are two very essential programs that every Motion Designer needs to know. By the end of this course, you’ll be able to create your own artwork from scratch with tools and workflows used by professional designers every day.

    Adobe Photoshop and Illustrator are essential tools for every Motion Designer to master. Almost every Motion Graphics project out there …

  • Security , Shop

    eLearnSecurity – Threat Hunting Professional v2

    Course at a glance

    • Establish a proactive defense mentality
    • Hunt for threats in your organization’s systems and network
    • Use threat intelligence or hypotheses to hunt for known and unknown threats
    • Inspect network traffic and identify abnormal activity in it
    • Perform memory forensics using Redline, Volatility and a variety of tools to identify in-memory malware
    • Use tools such as Sysmon and …
  • Security , Shop

    Antivirus Evasion Course By DedSec (In Hindi)

    Course Topic

    1. Introduction of AVS Crypters & Virus
    2. Bypass AVS Runtime using Based64 Technique
    3. Signature Cloning Bypassing Runtime
    4. Bypass Windows Defender For Lifetime
    5. Make your Stub Clean
    6. Manually Encrypting Virus using Algorithm
    7. Using Different Algorithm For Cleaning Virus
    8. Making FUD Virus Using C# And HEX
    9. Code Your Own Crypter
    10. Android Botnet




    Original Price: 2000
    Our Price: 370
  • Programming , Shop – Build a SwiftUI app for iOS 14

    This year, SwiftUI got major upgrades from the WWDC 2020. The big news is that thanks to Apple Silicon, Macs will be able to run iOS and iPad apps soon. SwiftUI is the only framework that allows you to build apps for all of Apple’s five platforms: iOS, iPadOS, macOS, tvOS and watchOS with the same codebase. New features like …

  • Security , Shop

    Advance Of Black Hat Hacking Course By DedSec (In Hindi)

    Course Topic

    1. Advance WIFI Hacking
    2. Android Hacking
    3. Android Screen Lock Cracking
    4. Attack and down All Wifi networks In Your Area
    5. Basic of Linux Operating System
    6. BeFF Over WAN Attack
    7. Black Hat Mailing
    8. Bug Bunty English
    9. Carding
    10. CCTV Camera Hacking
    11. Crack any software
    12. Dos And DDOS Attacks
    13. Email Bombing
    14. Email Hunting
    15. Hacking With Wireshark
    16. Information Gathering
    17. Making Money Online
    18. MITM Attack …
  • Security , Shop

    Reverse Engineering Course – The Hacks Behind Cracking By DedSec (In Hindi)


    In this Reverse Engineering training course, expert  DedSec will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in RE.You will start by learning about reversing compiled Windows applications,Once you have completed this …