Network & Security
Master OAuth 2.0: A Practical Guide to API Security, OAuth 2.0 with practical flows, implementations, real-world use cases, and decision-making for robust API architectures.
Course Description
...
Become a Hydra Expert: Advanced Brute Forcing Techniques, Master Hydra for ethical hacking with real-world examples, covering advanced brute-forcing techniques.
Course Description
Are you ready ...
PowerShell for Windows Security: Beginner's Guide, Secure Windows Systems with PowerShell.
Course Description
Take control of your Windows systems with PowerShell, the powerful scripting ...
Recon Ninja: Advanced Info Gathering for Ethical Hackers, Learn how to gather intelligence like a pro with advanced reconnaissance tools and techniques for ethical hackers.
Course Description
...
Android Malware Analysis, Analyse any Android app.
Course Description
Malware is a significant problem and threat. With hundreds of apps available. How can you know if apps you install are safe? ...
Apply Zero Trust Security Model for Azure Virtual Desktop, AVD Zero Trust Security: Safeguarding Your Azure Virtual Desktop Environment with Proven Strategies and Best Practices.
Course Description
...
Beginning Bash Scripting, Learn Linux Bash Scripting.
Course Description
Bash is a Unix shell script language. A shell is an interactive prompt that appears when Linux boots up. It's ...
IT Security 101 - Cyber Security for Beginners, Learn cyber security best practice tips on securing computer networks from internal & external IT cyber security threats.
Course Description
...
Wordpress Security, A Hackers Perspective.
Course Description
Alright, imagine you're chilling online, minding your own biz, and suddenly, bam! Some sneaky hacker tries to crash your WordPress ...
Hackers Toolkit, First Steps in Hacking.
Course Description
Welcome to the realm of cybersecurity exploration with "Hackers Toolkit." This course is your ticket to understanding the tools ...
Malware Analysis & Incident Response for IT Technicians, Learn the best way to prevent and respond to IT security incidents such as ransomware on your organisation's network.
Course Description
...
- 1
- 2
- 3
- …
- 68
- Next Page »