IT & Software

Sub Categories

The Malware Analysis Course

Malware analysis is the process of understanding the behavior and purpose of a suspicious file or UR...

Ratings: 3.13/5.00     Lectures: 6  Subscribers: 37199

DetailsTake This Course

Master Course in ChatGPT (101 Level)

Master course in ChatGPT :  OpenAI's buzzy chatbot can solve problems, write code, and tell cre...

Ratings: 3.25/5.00     Lectures: 5  Subscribers: 37149

DetailsTake This Course

AWS Business Essentials - The Business Value of AWS [2024]

This course provides a comprehensive introduction to cloud computing, including its benefits, how it...

Ratings: 4.64/5.00     Lectures: 38  Subscribers: 37096

DetailsTake This Course

Curso de Hacking Ético Web - Pentesting en Webs

Bienvenidos al Curso de Hacking Etico Web - Pentesting en Webs.Este curso de Hacking Ético Web es pe...

Ratings: 4.13/5.00     Lectures: 47  Subscribers: 36841

DetailsTake This Course

Azure Kubernetes Service with Azure DevOps and Terraform

******* Course Overview *******Welcome to this Amazing course on Azure AKS Kubernetes - Masterclass...

Ratings: 4.30/5.00     Lectures: 216  Subscribers: 36728

DetailsTake This Course

Git Command Line for Beginners

Learn about Project Version controll with the tool named Git.  Git enables you to work on a pro...

Ratings: 4.26/5.00     Lectures: 19  Subscribers: 36724

DetailsTake This Course

Hacking Ético desde Dispositivos Android

Bienvenidos al Curso de Hacking Ético desde Dispositivos Android.Este curso tiene como objetivo ense...

Ratings: 4.07/5.00     Lectures: 29  Subscribers: 36603

DetailsTake This Course

Docker for Beginners: DevOps for Java & Spring Boot

Do you want to learn to Create Docker Images and containers for Java Spring Boot Applications a...

Ratings: 4.33/5.00     Lectures: 63  Subscribers: 36542

DetailsTake This Course

TOTAL: CompTIA Network+ (N10-008)

Welcome to the TOTAL: CompTIA Network+ Certification (N10-008) course from Mike Meyers, Jo...

Ratings: 4.73/5.00     Lectures: 172  Subscribers: 36525

DetailsTake This Course

Curso completo de Hacking Ético y Ciberseguridad

¡Bienvenido a este curso en el que aprenderás todo lo que necesitas saber para convertirte en un exp...

Ratings: 4.74/5.00     Lectures: 117  Subscribers: 36498

DetailsTake This Course

Linux Security and Hardening, The Practical Security Guide.

JOIN THE OTHER 40,000 SUCCESSFUL STUDENTS WHO HAVE ALREADY MASTERED THE LINUX OPERATING SYSTEM WITH...

Ratings: 4.54/5.00     Lectures: 58  Subscribers: 36479

DetailsTake This Course

ChatGPT: Complete ChatGPT Guide For Beginners

The Complete ChatGPT Guide for Beginners Course is provides hands-on exercises and projects to help...

Ratings: 3.71/5.00     Lectures: 15  Subscribers: 36070

DetailsTake This Course

The Complete Certified in Cybersecurity (CC) course ISC2 '24

Welcome, I am Thor Pedersen, and I am here to help you get that critical entry level Cyber security...

Ratings: 4.68/5.00     Lectures: 143  Subscribers: 36037

DetailsTake This Course

.NET Core Microservices - The Complete Guide (.NET 8 MVC)

Is your project or your team suffering from the drawbacks of a Monolithic application? or are you on...

Ratings: 4.57/5.00     Lectures: 208  Subscribers: 35935

DetailsTake This Course

Reverse Engineering 5: Reversing Visual Basic

If you are interested in reverse engineering and want to learn how to decompile and debug Visual Bas...

Ratings: 4.75/5.00     Lectures: 15  Subscribers: 35884

DetailsTake This Course

Mobile Security: Reverse Engineer Android Apps From Scratch

This is an introductory course suitable for cyber security newcomers as well as cyber security profe...

Ratings: 4.44/5.00     Lectures: 46  Subscribers: 35731

DetailsTake This Course

Android Penetration Testing

In this course you will be learning about the basics of android pentesting. Throughout the lectures...

Ratings: 4.19/5.00     Lectures: 20  Subscribers: 35675

DetailsTake This Course

Ethical Hacking: nmap in depth

When it comes to hacking, knowledge is power. So how do you get more knowledge about your target sys...

Ratings: 4.32/5.00     Lectures: 15  Subscribers: 35637

DetailsTake This Course

Intune (MDM / MAM) Microsoft training course with HANDS ON

We really hope you'll agree, this training is way more then the average course on Udemy! Have access...

Ratings: 4.59/5.00     Lectures: 72  Subscribers: 35610

DetailsTake This Course

Curso de Google Hacking || Dorks Comandos para Hackear

Google Hacking podemos definirlo como una técnica informática que usa operadores o comandos para fil...

Ratings: 4.07/5.00     Lectures: 20  Subscribers: 35531

DetailsTake This Course