INE – Email Security Appliance
This is another episode of INE’s CCIE Security v5 Technology series. The course discusses email communication and methods of securing it with the aid of Cisco’s Email Security Appliance (ESA). By...
View ArticlePluralSight – Implementing Docker Security
Docker Containers pose a new type of attack surface and security risk to organizations. This course will teach you how to implement Docker Security Docker is one of the most popular containerization...
View ArticleLinkedin Learning – SSCP Cert Prep: 6 Networks and Communications Security
Learn the detailed information you need to prepare for the Networks and Communications Security domain of the SSCP exam The Systems Security Certified Practitioner (SSCP) certification is an excellent...
View ArticleLinkedin Learning – GIAC Security Essentials-ITProTV
As a security professional, you may need to demonstrate that you are qualified for hands-on security tasks in IT systems. GIAC has been an industry leader in information security certifications for...
View ArticleUdemy – CompTIA CASP + Enterprise Security Operations – Domain 3
Developed by CompTIA leading partner. Over 90% pass rate. Free Flash Cards & Practice Exam Included. What you’ll learn conduct a security assessment using the appropriate methods Analyze a scenario...
View ArticleLinkedin Learning – GIAC Security Essentials GSEC
Use this course in your preparations for the GIAC Security Essentials (GSEC) certification As a security professional, you may need to demonstrate that you are qualified for hands-on security tasks in...
View ArticleUdemy – Docker Security AWS Basics Jenkins
All by real time examples In this course, you will be learn Docker (Architecture, Client, Images, Containers, Registry, and Demon) and Swarm from scratch. In addition to that, you will be going to...
View ArticleINE – Network Management Security
This is another episode of our CCIE Security v5 Technology series. The course focuses on various features commonly deployed to protect the Management Plane, including fundamental network infrastructure...
View ArticleApress – Securing a Spring Boot REST API Using Spring Security with iPad Pro...
DescriptionBuild a complex and practical Web Application anywhere with a minimalistic setup. Not only will you get to experience technologies used in famous enterprise web applications, you will also...
View ArticleInfosec – Cloud Security Architecture
Cloud Security Architecture training This learning path provides an in-depth look at cloud security architecture. As you progress through 17 courses, you’ll build your knowledge and skills around cloud...
View ArticleThe Ultimate Dark Web, Anonymity, Privacy & Security Course | Udemy
85+ videos (10+ hours) to take you from 0 to advanced in anonymity, privacy & security. Anonymously access the dark net and TOR hidden services (onion services). Install, configure & use...
View ArticleLinkedin Learning – Ethics in Information Security
Learn about the ethics of working in cybersecurity and how to have challenging conversations about those ethics Cybersecurity professionals frequently find themselves at the center of moral and ethical...
View ArticleUdemy – The Complete Cyber Security Course Anonymous Browsing
Volume 3: Become a Cyber Security Specialist, Anonymous Browsing, Hide my IP, Tor, Privacy, Proxy Servers and Best VPNs Learn a practical skill-set in staying anonymous online and maintaining total...
View ArticleUdemy – The Complete Cyber Security Course End Point Protection!
Volume 4 :Become a Cyber Security Specialist, Antivirus & Malware, Disk Encryption, Finding & Removing Hackers & Malware Learn a practical skill-set in securing laptops, desktops and mobile...
View ArticleUdemy – Linux Security and Hardening The Practical Security Guide
Secure any Linux server from hackers & protect it against hacking. The practical Linux Administration security guide JOIN THE OTHER 40,000 SUCCESSFUL STUDENTS WHO HAVE ALREADY MASTERED THE LINUX...
View ArticleManning – Making Sense of Application Security
Adib Saikali provides a roadmap for application developers and architects to master application security. Adib identifies the security skills you should possess as an application developer and the key...
View ArticleEC-Council – OWASP Top 10 Security Fundamentals
Unless you try to exploit a vulnerability yourself, no reading will give you the required know-how to fully understand the impact and avoid such weaknesses in your applications. To become a better...
View ArticleUdemy – The Ultimate Dark Web, Anonymity, Privacy & Security Course
Learn how to access & use the dark net and the clear net privately, anonymously and securely Welcome to the ultimate dark net, privacy, anonymity and security course. With no prior knowledge...
View ArticleUdemy – The Complete Nmap Ethical Hacking Course Network Security
Become an expert in the ethical hacking and network security tool Nmap! Welcome to the Complete Nmap Course! Nmap is the Internets most popular network scanner with advanced features that most people...
View ArticlePluralSight – Salesforce Sharing And Security Fundamentals
rapidgator.net/file/7185561a5ac8bb3abbb4560952fc2d8e/PluralSight.Salesforce.Sharing.And.Security.Fundamentals.Bookware-KNiSO.rar.html...
View Article