IT & Software > > Network & Security

Practical Pentesting

In this series, Daniel and Brad will take a look at what a Pentesting engagement looks like through...

Ratings: 2.50/5.00     Lectures: 21  Subscribers: 5

DetailsTake This Course

Redes de Computadores com Packet Tracer

Para as aulas de redes de computadores utilizo dois livros de redes de computadores escritos por mim...

Ratings: 1.87/5.00     Lectures: 45  Subscribers: 5

DetailsTake This Course

The Complete Grafana Guide For Beginners

Do you like Grafana and want to give the first step? Are you into Grafana and want to understand the...

Ratings: 1.27/5.00     Lectures: 18  Subscribers: 5

DetailsTake This Course

Administrador de EdgeDNS con Akamai

Muchas empresas disponen de servicios DNS onpremise, sin embargo, todo está migrando a las nubes o s...

Ratings: 1.00/5.00     Lectures: 4  Subscribers: 5

DetailsTake This Course

Learn Ethical Hacking from Scratch [Hindi]

Hello Everyone, We are working on knowledge development for youth Here you can learn about CyberSecu...

Ratings: 1.00/5.00     Lectures: 47  Subscribers: 5

DetailsTake This Course

Kali Linux et ses outils: Niveau 1

La formation "Exploration éthique des fondamentaux du hacking: Initiation au Niveau 1" offre une plo...

Ratings: 0.00/5.00     Lectures: 34  Subscribers: 5

DetailsTake This Course

Kali Linux et ses outils : Niveau 2

Découvrez le monde fascinant de la sécurité informatique avec notre formation avancée en Hacking Éth...

Ratings: 0.00/5.00     Lectures: 21  Subscribers: 5

DetailsTake This Course

Mastering Palo Alto Networks Firewall Version 9 & 10

Welcome to our Palo Alto Networks Firewall course. If you plan to deeply understand Palo Alto Next-G...

Ratings: 0.00/5.00     Lectures: 33  Subscribers: 5

DetailsTake This Course

从零开始分析恶意代码

恶意代码是指被设计用于对计算机系统、网络或个人计算机用户进行破坏、窃取信息或违法活动的计算机程序或脚...

Ratings: 0.00/5.00     Lectures: 23  Subscribers: 5

DetailsTake This Course

Windows API Hooking

We often hear the words in movies “he has hooks on you”. this means he is controlling you.In same an...

Ratings: 0.00/5.00     Lectures: 8  Subscribers: 5

DetailsTake This Course

Deepfake Defense for Cybersecurity & GRC Professionals

Are You Ready to Defend Against Deepfakes?This course is designed for cybersecurity and GRC (Governa...

Ratings: 0.00/5.00     Lectures: 29  Subscribers: 5

DetailsTake This Course

Level 2 OSINT: Open-Source Intelligence Windows edition

In this course we will be continuing our learning and understanding of OSINT. If you took my previou...

Ratings: 0.00/5.00     Lectures: 74  Subscribers: 5

DetailsTake This Course

Segurança da Informação : Conscientização para Empresas

O Curso de Conscientização sobre Segurança da Informação é um programa educacional abrangente projet...

Ratings: 0.00/5.00     Lectures: 16  Subscribers: 5

DetailsTake This Course

Ethical Hacking: Bypassing Windows Password

Hi, and welcome. So, you want to learn how to bypass the authentication system on a windows computer...

Ratings: 0.00/5.00     Lectures: 7  Subscribers: 5

DetailsTake This Course

CFE Certified Fraud Examiner | Law

Welcome to The CFE Certified Fraud Examiner Guide to Success from First Try.Section 4: Law (Legal El...

Ratings: 0.00/5.00     Lectures: 0  Subscribers: 5

DetailsTake This Course