IT & Software

Sub Categories

Advanced Metasploit Cyber Security Course

The Metasploit framework is a very powerful tool which can be used by cybercriminals as well as ethi...

Ratings: 2.11/5.00     Lectures: 5  Subscribers: 18620

DetailsTake This Course

Docker : Docker A-Z+Kubernetes Basics-HandsOn-DevOps(2024)

Some of the many cool things you'll do in this course:Learn to use docker container from scratch.How...

Ratings: 4.48/5.00     Lectures: 25  Subscribers: 18524

DetailsTake This Course

Income Tax – Schedule C Small Business Sole Proprietor

This course will focus on tax preparation for taxpayers who have self-employment incomed generally r...

Ratings: 4.63/5.00     Lectures: 173  Subscribers: 18438

DetailsTake This Course

Learn API Testing using Postman, SoapUI & RestAssured

Course Overview: Mastering Back-End Testing and API AutomationIn today's digital landscape, web appl...

Ratings: 4.64/5.00     Lectures: 39  Subscribers: 18407

DetailsTake This Course

¿Cómo reducir el riesgo de un ciberataque? - Curso Ejecutivo

61% de los líderes de tecnologías de información y seguridad han expresado su  preocupación por...

Ratings: 4.44/5.00     Lectures: 9  Subscribers: 18233

DetailsTake This Course

Top 5 Tools & Tricks for Ethical Hacking & Bug Bounties 2021

Welcome to Top 5 Tools & Techniques for Pentesting in Cyber Security Course. This course covers...

Ratings: 4.54/5.00     Lectures: 50  Subscribers: 18218

DetailsTake This Course

ChatGPT Plugins: The Complete Guide

In this course, you will learn everything you need to know about ChatGPT plugins. You will learn how...

Ratings: 4.49/5.00     Lectures: 80  Subscribers: 18216

DetailsTake This Course

Getting Started With SolidWorks Hands On - Learn by Doing

In this course, we will go over how to create basic parts and a simple assembly using SolidWorks. Yo...

Ratings: 4.62/5.00     Lectures: 13  Subscribers: 18206

DetailsTake This Course

Ultimate Ethical Hacking from Zero To Hero

What is Ethical Hacking?Ethical hacking is an authorized practice of detecting vulnerabilities in an...

Ratings: 4.19/5.00     Lectures: 145  Subscribers: 18148

DetailsTake This Course

DevOps Deployment Automation with Terraform, AWS and Docker

Welcome to the advanced course on how to set up a deployment automation that’s capable of handling m...

Ratings: 4.64/5.00     Lectures: 105  Subscribers: 18146

DetailsTake This Course

CodeIgniter 4: Create Web Applications using PHP and MySQL

Hello! In this course I'd like to introduce you to CodeIgniter 4, a web application framework you ca...

Ratings: 2.57/5.00     Lectures: 56  Subscribers: 18120

DetailsTake This Course

Frontend Development with ReactJS and Bootstrap

In this course, you will learn everything that is needed for you to become a Pro React JS developer...

Ratings: 3.98/5.00     Lectures: 11  Subscribers: 18083

DetailsTake This Course

Ethical Hacking: Become Ethical Hacker | Penetration Testing

Welcome to Ethical Hacking: Become Ethical Hacker | Penetration Testing course.Ethical Hacking...

Ratings: 4.57/5.00     Lectures: 203  Subscribers: 18081

DetailsTake This Course

Windows Command Mastery for Ethical Hackers

Welcome to "Windows Command Mastery for Ethical Hackers," a comprehensive course designed to equip e...

Ratings: 4.14/5.00     Lectures: 14  Subscribers: 18012

DetailsTake This Course

Introduction to Git for GitLab projects

This course is neither endorsed by, nor in partnership, nor affiliated with GitLab, Inc. GitLab is t...

Ratings: 4.48/5.00     Lectures: 32  Subscribers: 17969

DetailsTake This Course