IT & Software > > Network & Security

A Guide to Ransomware Protection

In the recent years ransomware became talk aof the town and is creating big issues for small as well...

Ratings: 4.29/5.00     Lectures: 33  Subscribers: 13267

DetailsTake This Course

Calcule sub-redes de uma maneira fácil

Em um mundo onde precisamos economizar endereços IP, pois o IPv4 está nos deixando com uma quantidad...

Ratings: 4.28/5.00     Lectures: 22  Subscribers: 13242

DetailsTake This Course

Security Operations Center - SOC with Splunk & FortiSIEM

The aim of this course is to prepare you to give a successful interview with a Cybersecurity firm fo...

Ratings: 4.01/5.00     Lectures: 55  Subscribers: 13207

DetailsTake This Course

Learn Ethical Hacking Using Kali Linux Red Team Tactics

What is ethical hacking?Ethical hacking involves an authorized attempt to gain unauthorized access t...

Ratings: 4.07/5.00     Lectures: 132  Subscribers: 13164

DetailsTake This Course

Ethical Hacking: Reverse Shells

A reverse shell is a type of shell in which the primary function is to enable an attacker to gain re...

Ratings: 4.26/5.00     Lectures: 12  Subscribers: 13045

DetailsTake This Course

Ethical Hacking: Offensive Security

This course is about ethical hacking for penetration testers and ethical hackers.Ethical hacking is...

Ratings: 4.75/5.00     Lectures: 6  Subscribers: 13024

DetailsTake This Course

Virtual Private Networks for beginners - VPN, Cisco training

    A virtual private network (VPN) is a network that uses the Internet, to provide remot...

Ratings: 4.43/5.00     Lectures: 32  Subscribers: 12956

DetailsTake This Course

Cyber Security: The Ultimate Beginner's Handbook

What would you like to learn?Introduction to Cyber Security:What is cyber security?Why you need to k...

Ratings: 3.82/5.00     Lectures: 46  Subscribers: 12875

DetailsTake This Course

Curso de Forense Computacional

A Forense Computacional abrange todas as questões relacionadas aos crimes praticados na Internet ou...

Ratings: 4.54/5.00     Lectures: 11  Subscribers: 12777

DetailsTake This Course

Reverse Engineering: Create Your Own GUI CrackMe using C++

If you want to get started quickly on building rich gui-based crackmes using drag and drop method th...

Ratings: 4.90/5.00     Lectures: 19  Subscribers: 12765

DetailsTake This Course

VLSI - Essential concepts and detailed interview guide

This course is about Basic concepts of VLSI System Design. The course is designed in the form of...

Ratings: 3.93/5.00     Lectures: 72  Subscribers: 12723

DetailsTake This Course

Bug Bounty - Web Application Penetration Testing B|WAPT

Hello Everyone!!!welcome to the  i.e. the Bug Bounty - Web Application Penetration Testing B|WA...

Ratings: 3.95/5.00     Lectures: 41  Subscribers: 12695

DetailsTake This Course

AppArmor - Linux Security

In this course you will learn how to use AppArmor.AppArmor lets you control whats apps can do.  You...

Ratings: 2.92/5.00     Lectures: 12  Subscribers: 12670

DetailsTake This Course

Cryptography from Scratch| Master Cryptography in Java

So do you want to learn cryptography? and you want to understand it, be able to describe it, be abl...

Ratings: 3.67/5.00     Lectures: 19  Subscribers: 12604

DetailsTake This Course

5G, 4G LTE, 3G, 2G; Mobile/Cellular Networks For Beginners

Mobile Communication is the use of technology that allows us to communicate with others in different...

Ratings: 4.33/5.00     Lectures: 124  Subscribers: 12503

DetailsTake This Course