Showing 28–36 of 1084 results

  • Security , Shop

    Malware Analyst Professional – Level 1

    In this malware analysis and reverse engineering course, you will delve into the inner core of dissecting different malware types and variants, understand the adversarial mindset behind them and the used TTPs. At the end of the course, you will gain the power and knowledge to win any malware coming your way.

     

    HOMEPAGE – https://training.trainsec.net/malware-analyst-professional-level-1

     

    Original Price: $350
    Our Price: $20
  • Programming , Shop

    Ruby on Rails 7

    Learning Rails should be filled with many wonderful “Aha!” moments. But there’s a good chance other courses spoiled that by either (unintentionally, of course) treating you like a 6-headed superhuman or a half-brained dimwit.

    If you really had 6 brains, you could juggle multiple concepts at the same time. And yet, in our 21 years of teaching, we’ve only run …

  • Security , Shop

    Adversary Tactics: Vulnerability Research for Operators

    In Adversary Tactics: Vulnerability Research for Operators, you will learn an operator-focused approach to find the vulnerabilities needed to escalate privileges, execute arbitrary code, or facilitate lateral movement in Windows environments. We will give you the methodology and identify tools to find these weaknesses during active operations, when costly lead time and dedicated lab environments are unavailable. This course covers …

  • Security , Shop

    Windows Kernel Rootkits Training

    To achieve maximum stealth and obtain unabated access to the system, rootkits execute in kernel mode. This course focuses on the kernel interfaces (APIs), data structures and mechanisms that are exploited by rootkits to achieve their goals at every stage of their execution.

    This advanced course provides a comprehensive end-to-end view of the modus-operandi of rootkits by taking an in-depth look …

  • Animation & Graphics , Shop

    Full Character Rigging in After Effects

    Hi there, you all have been probably offered a project in which you need to do character rigging in After Effects.

    but because you think the rig and animating a character is very hard and you’re not able to do it, you reject the offer and you don’t even go for it. Or maybe many times you wanted to solve this problem and once …

  • Security , Shop

    Applied Web Application Hacking

    Most organisations utilise web applications. Due to the exposed nature of web applications and complex business logic they contain, they are a valuable target for attackers. Throughout this course focus will be placed on the various vulnerabilities that could affect web applications.

    This course will teach you how to analyse web applications for vulnerabilities and teach you how to exploit them …

  • Networking , Security

    CCNP and CCIE Security Core SCOR 350-701 (Exam Blueprint 1.1)

    The CCNP and CCIE Security Core SCOR 350-701 video course is for anyone interested in learning about key Cisco security as well as anyone studying for the CCNP and CCIE Security exam. Best-selling author and speaker Omar Santos will walk you through the vast array of security topics using dynamic presentations, demos, and test-taking techniques to help you understand security threats, preventative …

  • Networking , Shop

    AWS Certified Advanced Networking – Specialty (ANS-C01)

    This expert AWS Certified Advanced Networking – Specialty (ANS-C01) training prepares cloud infrastructure engineers to design, implement, manage, and secure AWS and hybrid network architectures at scale and in accordance with AWS best practices.

     

    HOMEPAGE – https://www.cbtnuggets.com/it-training/aws/aws-certified-advanced-networking

     

    Original Price: $59
    Our Price: $6
  • Linux & IT , Security

    Linux Professional Institute Security Essentials (020-100)

    If you want a career in cybersecurity, you should plan on eventually mastering Linux security. The Linux operating system or permutations of it exist on networks all over the world — sometimes powering entire networks and other times running individual devices. It’s a fundamental skill of a security professional to know the ins and outs of Linux security, and that’s …