In telecommunications, Long-Term Evolution (LTE) is a standard for wireless broadband communication...
Ratings: 4.32/5.00 Lectures: 6 Subscribers: 70
என் பெயர் சூர்யா நான் ஒரு எத்திக்கல் ஹேக்கர். நான் இந்த பாடத்தில் ஆண்ட்ராய்டு ஹேக்கிங் கற்று தர போகி...
Ratings: 4.16/5.00 Lectures: 45 Subscribers: 70
Cyber Law & Cyber Security Management can be defined as a bundle of decisions and acts which a C...
Ratings: 4.00/5.00 Lectures: 17 Subscribers: 70
[Course is up-to-date with January, 2016 information!]"I wouldn't have thought there is so much info...
Ratings: 3.62/5.00 Lectures: 28 Subscribers: 70
Puppet is a configuration management system that helps you automate all your IT configurations, givi...
Ratings: 3.19/5.00 Lectures: 39 Subscribers: 70
What is SD-WAN ? Software-Defined WAN (SD-WAN) is an overlay architecture that overcomes the bi...
Ratings: 1.00/5.00 Lectures: 59 Subscribers: 70
Este curso tem como objetivo apresentar a ferramenta de disparo de campanhas de phishing Gophish.Não...
Ratings: 4.96/5.00 Lectures: 24 Subscribers: 69
This course goes through two different Risk Management Frameworks (RMF and CRISC) and deta...
Ratings: 4.79/5.00 Lectures: 15 Subscribers: 69
Learn about PaloAlto's Prisma Access which is a leading Security Solution for corporate adopting clo...
Ratings: 4.63/5.00 Lectures: 51 Subscribers: 69
In this course we will explore AWS Appstream 2.0 service in depth. We would discuss the concepts of...
Ratings: 4.58/5.00 Lectures: 11 Subscribers: 69
Learn about the Installation, Configuration and the Management of Cisco Stealthwatch Cloud, to...
Ratings: 4.30/5.00 Lectures: 30 Subscribers: 69
Los certificados de Cisco se encuentran entre los certificados más válidos del mundo, y podrá aproba...
Ratings: 4.13/5.00 Lectures: 102 Subscribers: 69
Este curso foi criado para ajudá-lo a entender o SDN, seus componentes, sua arquitetura, como ele co...
Ratings: 4.05/5.00 Lectures: 50 Subscribers: 69
Computer hacking forensic investigation is the process of detecting hacking attempts and correctly o...
Ratings: 4.04/5.00 Lectures: 45 Subscribers: 69
O Curso de Noções para se tornar Analista de Segurança da Informação Express foi criado com o objeti...
Ratings: 3.82/5.00 Lectures: 14 Subscribers: 69
Routing is needed is every network. That's why, we, as network engineers, should understand routing...
Ratings: 4.72/5.00 Lectures: 28 Subscribers: 68
*UPDATED NOTE* This course was originally intended for the Udemy Business program (Which m...
Ratings: 4.60/5.00 Lectures: 83 Subscribers: 68
There are many tools available on the market for detecting security loopholes and networking attacks...
Ratings: 4.37/5.00 Lectures: 25 Subscribers: 68
الدورة بنشرح فيها مشروع الميتاسبلويت بشكل كامل وكيف نقوم باستخدامه وتوظيفه في عمليات اختبار الاختراق...
Ratings: 3.69/5.00 Lectures: 53 Subscribers: 68
Application Injection attacks are the most popular attacks for web application hacking and mobile ha...
Ratings: 3.68/5.00 Lectures: 14 Subscribers: 68