Security , Shop
Process Injection Analyst [CPIA]
- Develop a mindset to perform process injection in MS Windows Environment
- Analyse the events that are generated by different process injection techniques
- Premium study materials including pdf, videos and codes
- Help with developing custom tools
- Practical experience in different process injection techniques used by Threat Actors
HOMEPAGE – https://cyberwarfare.live/product/process-injection-analyst-cpia/
Original Price: $49
Our Price: $12
Programming , Shop
Build and Sell APIs – Establish a New Income Stream!
Boost your academic journey! Gain a competitive edge with real-world API skills that textbooks don’t teach.
Stay ahead in the tech race! Master APIs to innovate, integrate, and elevate your startup game.
Unlock a new cash stream! Discover the art of API creation and how it can be a goldmine.
HOMEPAGE – https://learnwithhasan.com/build-and-sell-apis-course/
Original Price: $79
Our Price: $7
Security , Shop
The Art of Malware Analysis
This course teaches the process of examining malicious software to understand how it works in a safe manner. With the growing number of cyber threats, the ability to analyze and understand malware is becoming an essential skill for professionals working in the cybersecurity industry. By taking this course, you can gain the knowledge and skills required to analyze different types …
Programming , Shop
FULLSTACK REACT WITH TYPESCRIPT MASTERCLASS
Fullstack React with TypeScript is the complete guide to using TypeScript with React. Learn TypeScript patterns with React additional ecosystem advice (testing, redux, SSR) by building several apps including a Trello clone, a Medium-like website, testing with a digital-item e-comm app, and more!
HOMEPAGE – https://www.newline.co/courses/fullstack-react-with-typescript-masterclass
Original Price: $195
Our Price: $20
Linux & IT , Security
INE – DevSecOps Bootcamp
In today’s world of continuous integration and continuous delivery, it has become imperative to involve security checks at every step of the process. The automation of build, deployment, and setup preparation processes using DevOps process as well as automating code review, security scanning, security testing, and vulnerability management using DevSecOps processes improves the quality and security posture of the project …
Security , Shop
Exploitation with Kali
This course consists of 100% hands-on technical labs, utilizing Kali Linux to hack a variety of intentionally vulnerable operating systems. All of the resources to build the labs are free. Detailed instructions on how to set up the labs are included within this course. To make the most out of this course, it is recommended that you actually perform the …
Programming , Shop
Build UI – Ship an app with Remix
In this course you’ll learn Remix by building a personal Work Journal app. You’ll set up a database, render pages with dynamic data, use actions and forms to save user input, explore nested routing, learn how to render custom error pages, and finish by adding authentication and deploying your app.
By the end, you’ll have a polished Remix app of your …
Programming , Shop
Neetcode.io – System Design for Beginners
Learn the foundations of system design interviews.
HOMEPAGE – https://neetcode.io/courses/system-design-for-beginners/0
Our Price: $7
Security , Shop
CodeMachine – Windows Malware Techniques Training
User mode malware on Windows is ubiquitous and custom user mode implants are used regularly in red-team engagements. Knowledge of the latest malware techniques helps red teamers improve their custom tooling, malware analysts in taking apart malware, and anti-malware solution developers in designing behavioral solutions to detect malicious activity.
The common theme amongst all Windows malware and implants is that they …
Shop
Showing 145–153 of 1054 results