[Coursera] DevOps, Cloud, and Agile Foundations Specialization

Coursera – DevOps, Cloud, and Agile Foundations Specialization [FCO] What you’ll learn • DevOps essential characteristics including culture, behavior, practices, tools, methodologies, technologies and metrics. • Core concepts of Cloud Computing, including its benefits, models, use cases,   platforms, services, resources and opportunities. • Agile practices of small batches, minimum viable products, pair programming, behavior- […]

[ITProTV] Hands-On Web App Pentesting

ITProTV – Hands-On Web App Pentesting [FCO] About Web Application Penetration Testing Skills In this episode, we discuss the purpose, scope, and skills you’ll learn in the Hands-on Web App Pentesting series. In-Detail This course is designed for those looking to gain skills related to penetration testing web applications. We start by covering topics that […]

[EC-Council] Certified Ethical Hacker CEH v11 [2022]

EC-Council – Certified Ethical Hacker CEH v11 [2022] [FCO] About Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization. With the CEH v11 we’ve taken all that the CEH already is and added more to it, […]

[Hacker House] Exclusive Hacker House Trainings

Hacker House – Exclusive Hacker House Trainings [FCO]   Hands-on Hacking™ Learn practical ethical hacking skills online with Hacker House Description : Hacker House Hands-On Hacking course is an intensive introductory course that teaches applied hacking methodologies in a hands-on practical orientated approach. Our course is engineered from decades of experienced cyber security practitioner’s knowledge to […]

[O’REILLY] Threat Intelligence and Threat Hunting

  Video Description: 7+ hours of video training exploring key threat intelligence and threat hunting concepts   Overview: A cybersecurity professional needs to understand threats, threat actors, and have a clear understanding of where attackers are trying to take advantage of vulnerabilities. With more than 7 hours of video training, Threat Intelligence and Threat Hunting […]

[Pluralsight] Ethical Hacking: Hacking Wireless Networks

  About Wireless provides one of the biggest attack vectors for hackers. This course will teach you how to secure wireless networks needed for the [CEH 312-50] exam.   Description Wireless technologies have changed our world, but it’s also given hackers another attack vector . In this course, Ethical Hacking: Wireless Hacking, you’ll learn to […]

[O’REILLY] Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition

  Video Description Designed to help you pass the EC-Council Certified Ethical Hacker (CEH) certification exam.   Overview The Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition gives you a complete overview of the topics in the EC-Council’s updated Certified Ethical Hacker (CEH), V11 exam. This video course has six modules that dive into […]

[PentesterAcademy] Linux Privilege Escalation Bootcamp

  On-Demand: Linux Privilege Escalation Bootcamp   Description Familiarize yourself with beginner-to-advanced privilege escalation techniques on Linux.   What You’ll Learn The focus of this bootcamp is to familiarize you with beginner-to-advanced privilege escalation techniques on Linux. You will learn how to identify and leverage misconfigurations to perform horizontal/vertical escalation. The bootcamp will cover techniques […]