Showing 820–828 of 1068 results

  • Security , Shop

    Introduction to OWASP Top 10 Security Risks

    This course will introduce students to the OWASP organization and their list of the top 10 web application security risks. The course will analyze these risks from the attacker’s perspective and provide defensive techniques to protect against these risks.

     

    HOMEPAGE – https://www.anonymz.com/?https://acloudguru.com/course/introduction-to-owasp-top-10-security-risks

     

    Our Price: $2.99
  • Shop , Trading & Marketing

    LinkedinX – Make Money on Linkedin

    Imagine waking up to an account filled with notifications, meetings on your calendar, and a personal brand that builds itself on autopilot.

    That’s what you get by growing and monetizing your Linkedin account, and you’re only a few steps away from making that a reality.

    So go ahead and join LinkedInX below. Learn the exact strategy, which we’ve successfully used on repeat, …

  • Networking , Shop

    Hands-on with Cisco Meraki Wireless Access Points

    You will learn about the Cisco Meraki Cloud Architecture in an overview. This will introduce you to terminology and architecture that all Meraki products are connected to for management.

    Working with wireless access points. Well, that should be easy. When it comes down to Meraki, though there’s a whole different system involved. Find out more next right here on IT pro …

  • Programming , Security

    Python 201 for Hackers

    The Python 201 for Hackers course builds upon the Python 101 for Hackers course by moving beyond the basics. You will learn more advanced programming concepts and techniques, with a focus on how to use and apply Python as a Windows hacking tool. 

    Prior Python programming knowledge is required to be successful in this course. The Python 201 for Hackers course content …

  • Programming , Security

    DevSecOps: Beginner Edition Bootcamp

    Get a hands-on introduction to DevSecOps basics with a focus on implementing Devops and DevSecOps pipelines in on-premise, hybrid and on-public cloud models.

     

    HOMEPAGE – https://www.anonymz.com/?https://bootcamps.pentesteracademy.com/course/devsecops-on-demand

     

    Our Price: $6.99
  • Shop , Trading & Marketing

    7-Figure Email Machine

    Discover the simple 4×4 Email System 7, 8, and 9 figure companies like Natural Health Sherpa, V Shred, and Credit Secrets use to increase “hidden” email profits by up to 227%…

    And how you can use this step-by-step system to double, triple or even quadruple your freelance or business income…

     

    HOMEPAGE – https://www.anonymz.com/?https://7figureemails.podia.com/

     

    Original Price: $1,497
    Our Price: $6.99
  • Linux & IT , Shop

    Linux Email Services

    This is a standalone course on Linux Email Services and is also a learning path to prepare you for the LPIC-2 202-450 exam. This course is intended for students who have a basic understand of the Linux Operating System and can perform basic systems administration functions such as basic commands, navigating the filesystem structure, and performing some configuration tasks.

    We’ll start …

  • Security , Shop

    The Complete Cyber Security Course! – Volumes 1, 2, 3 & 4

    YOU CAN BECOME A CYBER SECURITY EXPERT!

    There is no need to spend years going through hundreds of different courses and still being average when it comes to practical knowledge of cyber security.

    Imagine you know everything important in the domain of cyber security…

    You can tackle all types of online threats, including advanced hackers, trackers, exploit kits, mass …

  • Security , Shop

    A Complete Practical Approach To Malware Analysis And Memory Forensics

    Malware analysis and memory forensics are powerful analysis and investigative techniques used in reverse engineering, digital forensics, and incident response. With adversaries getting sophisticated and carrying out advanced malware attacks on critical infrastructures, Data Centers, private and public organizations, it is essential for cyber-security professionals to have the necessary skills to detect, respond and investigate such intrusions. Malware analysis and …