Showing 28–36 of 996 results

  • Shop , Security

    Certified Red Team – CredOps Infiltrator [CRT-COI]

    • Explore Windows Credential Storage Internals

    • Explore DPAPI, WDigest, LSASS, WiFi, Browser, Registry, Credential Manager

    • Learn to Develop Fully Undetectable Implant

    • Manual Dumping Exercises

     

    HOMEPAGE – https://cyberwarfare.live/product/certified-red-team-credops-infiltrator-crt-coi/

     

    Original Price: $59
    Our Price: $15
  • Shop , Programming

    Building Multi-Platform Browser Extensions

    Skip the time reading outdated, unsupported documentation from multiple sources and get started with development immediately.

    Whether you are just curious on how browser extensions work or have an extension you want to create, we will guide you through the process every step of the way.

     

    HOMEPAGE – https://serversideup.net/building-multi-platform-browser-extensions/

     

    Original Price: $59
    Our Price: $7
  • Shop , Security

    Building Intrusion Detection Honeypots

    Intrusion Detection Honeypots rely on deception to trick attackers into interacting with fake systems, services, and data. In this class, you’ll get hands-on experience designing, building, deploying, and monitoring honeypots to detect network adversaries before they accomplish their goals.

     

    HOMEPAGE – https://www.networkdefense.io/library/building-intrusion-detection-honeypots-58155/211924/about/

     

    Original Price: $497
    Our Price: $25
  • Shop , Networking

    Higher-level WebRTC Protocols

    The Higher-level WebRTC Protocols training course is meant to go deeper into how WebRTC works. In a way, it is a continuation of our Low-level WebRTC Protocols course and is designed to be taken after it. Here, we will dive into the protocols that are used on top of RTP and RTCP and are used to manage and orchestrate the media delivery …

  • Shop , Security

    Detection Engineering with Sigma

    Sigma is the open standard language for writing detection queries for logs. In this class, you’ll get hands-on experience writing, modifying, and interpreting Sigma rules based on real-world detection scenarios.

     

    HOMEPAGE – https://www.networkdefense.io/library/detection-engineering-with-sigma-58157/310172/about/

     

    Original Price: $397
    Our Price: $20
  • Shop , Security

    Splunk for Security Analysts

    Learn how to use Splunk to find threats, centralize data, and make sense of logs. Built for security analysts who want to learn Splunk… by security analysts who use Splunk every day.

    Whether you’re a SOC analyst trying to prove an alert is a false positive, a responder looking for indications of lateral movement, a threat intel analyst tryiing to identify …

  • Shop , Trading & Marketing

    Game Frame Marketing

    The branding, marketing, and copywriting course that will change the way you think and write for life. Joe Polish (Founder of Genius Network, $100K, GeniusX, and the “I Love Marketing” Podcast) got a taste of GAME Frame and called it, “Absolutely amazing.” And Chris Voss, master negotiator and marketer, said, “This is fucking brilliant.” See what all the buzz is …

  • Shop , Linux & IT

    Deep Learning Specialization by DeepLearning.AI

    Become a Machine Learning expert. Master the fundamentals of deep learning and break into AI. Recently updated with cutting-edge techniques!

    What you’ll learn
    Build and train deep neural networks, identify key architecture parameters, implement vectorized neural networks and deep learning to applications

    Train test sets, analyze variance for DL applications, use standard techniques and optimization algorithms, and build neural networks in TensorFlow

    Build …

  • Shop , Linux & IT

    CBTNuggets – LPI Linux Essentials (010-160)

    This foundational LPI Linux Essentials training prepares systems administrators to take the LPI 010 exam, which is the one required exam to earn the LPI Linux Essentials certification.

    What is Linux? What is a Kernel? How do I use command lines, and what makes Linux a superior choice in comparison to other operating systems? Learn the answers to these questions and …