IT & Software > > Network & Security

LTE Protocol Testing : Basic to Advanced [PART 3]

In telecommunications, Long-Term Evolution (LTE) is a standard for wireless broadband communication...

Ratings: 4.32/5.00     Lectures: 6  Subscribers: 70

DetailsTake This Course

தமிழ் மொழியில் - ஆண்ட்ராய்டு நெறிமுறை ஹேக்கிங் பாடநெறி

என் பெயர் சூர்யா நான் ஒரு எத்திக்கல் ஹேக்கர். நான் இந்த பாடத்தில் ஆண்ட்ராய்டு ஹேக்கிங் கற்று தர போகி...

Ratings: 4.16/5.00     Lectures: 45  Subscribers: 70

DetailsTake This Course

Cyber Law Analyst

Cyber Law & Cyber Security Management can be defined as a bundle of decisions and acts which a C...

Ratings: 4.00/5.00     Lectures: 17  Subscribers: 70

DetailsTake This Course

I Know What You Did Last Time You Were Online ( ͡° ͜ʖ ͡°)

[Course is up-to-date with January, 2016 information!]"I wouldn't have thought there is so much info...

Ratings: 3.62/5.00     Lectures: 28  Subscribers: 70

DetailsTake This Course

Mastering Puppet 6 for Large Infrastructures -Second Edition

Puppet is a configuration management system that helps you automate all your IT configurations, givi...

Ratings: 3.19/5.00     Lectures: 39  Subscribers: 70

DetailsTake This Course

Cisco SD-WAN Viptela Automation

What is SD-WAN ? Software-Defined WAN (SD-WAN) is an overlay architecture that overcomes the bi...

Ratings: 1.00/5.00     Lectures: 59  Subscribers: 70

DetailsTake This Course

Campanha de phishing com Gophish (AWS + Email + Gophish)

Este curso tem como objetivo apresentar a ferramenta de disparo de campanhas de phishing Gophish.Não...

Ratings: 4.96/5.00     Lectures: 24  Subscribers: 69

DetailsTake This Course

NIST RMF (Risk Management Framework) and ISACA CRISC

This course goes through two different Risk Management Frameworks (RMF and CRISC) and deta...

Ratings: 4.79/5.00     Lectures: 15  Subscribers: 69

DetailsTake This Course

PaloAlto Prisma Access for Mobile Users and Remote Networks

Learn about PaloAlto's Prisma Access which is a leading Security Solution for corporate adopting clo...

Ratings: 4.63/5.00     Lectures: 51  Subscribers: 69

DetailsTake This Course

Amazon Appstream 2.0

In this course we will explore AWS Appstream 2.0 service in depth. We would discuss the concepts of...

Ratings: 4.58/5.00     Lectures: 11  Subscribers: 69

DetailsTake This Course

Network as a Sensor with Cisco Stealthwatch Cloud

Learn about the Installation, Configuration and the Management of Cisco Stealthwatch Cloud, to...

Ratings: 4.30/5.00     Lectures: 30  Subscribers: 69

DetailsTake This Course

Curso de Cisco CCNA 200-301 (Español)

Los certificados de Cisco se encuentran entre los certificados más válidos del mundo, y podrá aproba...

Ratings: 4.13/5.00     Lectures: 102  Subscribers: 69

DetailsTake This Course

SDN: Tecnologia, 5G & Transformação Digital

Este curso foi criado para ajudá-lo a entender o SDN, seus componentes, sua arquitetura, como ele co...

Ratings: 4.05/5.00     Lectures: 50  Subscribers: 69

DetailsTake This Course

Forensic Investigator Fundamentals

Computer hacking forensic investigation is the process of detecting hacking attempts and correctly o...

Ratings: 4.04/5.00     Lectures: 45  Subscribers: 69

DetailsTake This Course

Noções para se tornar um Analista de Segurança da Informação

O Curso de Noções para se tornar Analista de Segurança da Informação Express foi criado com o objeti...

Ratings: 3.82/5.00     Lectures: 14  Subscribers: 69

DetailsTake This Course

Juniper Routing All-in-1 Video Bootcamp

Routing is needed is every network. That's why, we, as network engineers, should understand routing...

Ratings: 4.72/5.00     Lectures: 28  Subscribers: 68

DetailsTake This Course

OSINT

*UPDATED NOTE* This course was originally intended for the Udemy Business program (Which m...

Ratings: 4.60/5.00     Lectures: 83  Subscribers: 68

DetailsTake This Course

Wireless Penetration Testing for Ethical Hackers

There are many tools available on the market for detecting security loopholes and networking attacks...

Ratings: 4.37/5.00     Lectures: 25  Subscribers: 68

DetailsTake This Course

دورة اختبار اختراق باستخدام الـ(MetaSploit) من الصفر للاحترف

الدورة بنشرح فيها مشروع الميتاسبلويت بشكل كامل وكيف نقوم باستخدامه وتوظيفه في عمليات اختبار الاختراق...

Ratings: 3.69/5.00     Lectures: 53  Subscribers: 68

DetailsTake This Course

Advanced Application Injection : Mobile and Website Hacking

Application Injection attacks are the most popular attacks for web application hacking and mobile ha...

Ratings: 3.68/5.00     Lectures: 14  Subscribers: 68

DetailsTake This Course