Showing 325–333 of 1048 results

  • Networking , Shop

    Palo Alto Networks 10.0 Firewall

    Do you want to learn how to block certain applications like BitTorrent, Skype, to Google Mail? Do you want to learn how to decrypt a secure web page a user may access to inspect it further? Do you want to learn how to block certain files uploaded towards the Internet? Do you want to setup your firewall to dynamic block …

  • Security , Shop

    iOS Application Security

    Can you guess an attack surface, which is constantly moving, connecting to several different wifi, stores user critical information and is still highly insecure? Well the answer is, Mobile applications. With almost 15% market share, iOS devices and iOS applications handle huge amount of user data. This requires these apps to be very secure and strong in terms of security.

    Though, …

  • Programming , Shop

    Modern JavaScript From The Beginning 2.0

    This is a 37+ hour in-depth course that will take you from the absolute beginning of JavaScript, learning about data types, functions and loops to learning DOM manipulation, asynchronous JS with promises, async/await and much more. You will even learn how to write unit tests for algorithms. We go into how JavaScript works under the hood including execution context, the …

  • Security , Shop

    Windows Post Exploitation w/ Kyle Avery

    Kyle Averystarted with Black Hills Information Security (BHIS) as an intern in October 2020 and was hired on as a full-time Penetration Tester in December 2020. When he is not on a test, he enjoys working on different R&D projects. Kyle says that he had always dreamed of working for BHIS because of community involvement, and the wealth of knowledge …

  • Security , Shop

    CyberChef for Security Analysts – NetworkDefense.io

    CyberChef for Security Analysts will teach you how to use CyberChef to perform common data manipulation, transformation, deobfuscation, and extraction techniques using real security data*. This isn’t just a simple tutorial, you’ll work through diverse exercises using real-world security data to build a toolkit of techniques.

    Simply put, CyberChef for Security Analysts is an example-driven master class on dealing with the …

  • Linux & IT , Security

    PowerShell for InfoSec

    PowerShell is an excellent cross-platform shell for executing commands and scripts on both local and remote machines. It is installed on Windows by default and is widely used by both network defenders and attackers. This course will cover key PowerShell concepts that both blue and red teamers should understand including logging, credential management, remote administration, security bypass techniques and popular …

  • Security , Shop

    Connect and Protect: Networks and Network Security

    In this course, you will explore how networks connect multiple devices and allow them to communicate. You’ll start with the fundamentals of modern networking operations and protocols. For example, you’ll learn about the Transmission Control Protocol / Internet Protocol (TCP/IP) model and how network hardware, like routers and modems, allow your computer to send and receive information on the internet. …

  • Linux & IT , Shop

    Advanced Embedded Linux Development Specialization

    This specialization provides students with the fundamentals of embedded operating systems including a working understanding of how to configure and deploy a Linux based Embedded System. Students will gain expertise in software tools and development methods which can be used to create applications and build custom Linux based Embedded Devices.

     

    HOMEPAGE – https://www.coursera.org/specializations/advanced-embedded-linux-development

     

    Our Price: $5
  • Security , Shop

    Certified Cloud Security Professional (CCSP)

    Certified Cloud Security Professional (CCSP) Complete Video Course provides 11 hours of comprehensive video that teaches you the six domains covered on the ISC(2) CCSP exam. ISC(2) established the Certified Cloud Security Professional (CCSP) credential to provide a path for cloud security professionals to display mastery of the necessary knowledge, skills, and abilities in cloud security design, implementation, architecture, management, controls, …