Showing 28–36 of 547 results

  • Networking , Shop

    NETGEAR Smart Managed Pro Training

    In this course, you will learn how to deploy NETGEAR Smart Managed Pro switches within a two-tier LAN topology step-by-step.  The NETGEAR Smart Managed Pro are  Layer-2 / Layer-3 switches with a web management user interface.

    We will teach you how to configure VLANs, assign ports to a specific VLANs, VLAN tagging, how to make VLANs routable, to even …

  • Business, Trading & Marketing , Shop

    The Agency Lead Generation Course 2.0

    The exact process we use to secure 5-20 new qualified prospect meetings every week for our clients.

     

    HOMEPAGE – https://sales-schema.teachable.com/p/fb-agency-lead-gen-course

     

    Original Price: $497
    Our Price: $10
  • Shop , Security & Hacking

    Breaching the Cloud w/ Beau Bullock

    Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this training course, hacking concepts will be introduced for each of those services.

    This training walks through a complete penetration testing methodology of cloud-based infrastructure. …

  • Animation & VFX , Shop

    Making 2D Cyberpunk Street in Photoshop and Animating It in After Effects

    In this course, Rutger will show you how to create a cyberpunk street scene and finally transform it into a camera movement animation. This course is suitable for beginner concept artists who have difficulty in composition and color use.

    Through this course, you will learn how to merge inspiration and reference to organize the street composition and learn how to adjust …

  • Shop , Security & Hacking

    Azure Pentesting

    This on-demand course is intended for IT and security professionals who want to apply the most common attacks and security pitfalls in order to compromise an Azure Tenant. We will discuss different ways of achieving initial access, privilege escalation and persistence in a compromised environment. Furthermore, to evaluate and understand the risks that a legacy on-premise environment brings to a …

  • Shop , Programming & Designing

    Java Programming Masterclass covering Java 11 & Java 17

    The course is a whopping 80 hours long.  Perhaps you have looked at the size of the course and are feeling a little overwhelmed at the prospect of finding time to complete it.   Maybe you are wondering if you need to go through it all?

    Firstly, Laura’s story above shows that you do not have to complete the entire course – she …

  • Shop , Security & Hacking

    Active Defense & Cyber Deception w/ John Strand

    Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between.

    In this class, you will learn how to …

  • Shop , Security & Hacking

    The Metasploit Framework

    The Metasploit Framework is one of the most widely utilized exploitation tools used by penetration testers and security researchers. For anyone looking to get started with a career in cybersecurity and penetration testing, the ability to use the Metasploit framework to conduct penetration tests and security audits is an essential skill to master on your path to becoming a competent …

  • Shop , Programming & Designing

    Windows Kernel Programming: Fundamentals

    In this course, we will learn the fundamentals of Windows kernel programming. We will start with I/O systems and learn how to write simple device drivers. We will also take a look at the I/O request packet to write more complex drivers.

     

    HOMEPAGE – https://www.pentesteracademy.com/course?id=58

     

    Our Price: $3