-
Vulnerability Assessment and Pentesting
Reveal sensitive information about your targets on Instagram like real-world expert hackers
Reveal sensitive information about your targets on Instagram ...
$79.99Beginner
4 hr 29 m
Hello
-
Cybersecurity
Uncover hidden information, track people and analyze networks
Uncover hidden information, track people and analyze networks...
$69.99Beginner
5 hr 0 m
Hello
-
Cybersecurity
Master OSINT Techniques to Detect Online Scams, Phishing, Fake Profiles, and Fraudulent Activities for Enhanced Cybersecurity and Informed Decision-Making
Master OSINT Techniques to Detect Online Scams, Phishing, Fak...
$0.00Beginner
Hello
-
Software Development
Protect your containers and Kubernetes deployments with OWASP Top 10 security guidelines.
Protect your containers and Kubernetes deployments with OWASP...
$59.99Intermediate
2 hr 45 m
Hello
-
Security Architecture and Operations
The Hands-on Approach to Master the Ten Most Critical Web Application Security Risks
The Hands-on Approach to Master the Ten Most Critical Web App...
$99.99Beginner
3 hr 50 m
Hello
-
Cloud Security
Access your data from everywhere in the world using any device (desktop or mobile). Your own "Dropbox clone" service!
Access your data from everywhere in the world using any devic...
$99.99Beginner
1 hr 52 m
Hello
-
Vulnerability Assessment and Pentesting
Learning the attack and defense
Learning the attack and defense
$59.99Intermediate
3 hr 30 m
Hello
-
Governance Risk and Compliance
Learn the PCI DSS version from scratch and prepare for the new 4.0 version
Learn the PCI DSS version from scratch and prepare for the ne...
$59.99Beginner
2 hr 0 m
Hello
-
Vulnerability Assessment and Pentesting
Learn pentesting with complete hands-on practical course
Learn pentesting with complete hands-on practical course
$59.99Advanced
3 hr 40 m
Hello
-
Career Path
Become a complete penetration testing professional with advanced tools and techniques.
7 Premium Courses
36 hr 36 m
Become a complete penetration testing professional with advan...
$99.00Hello
-
Career Path
Get Started with Kali Linux Pentesting and Master Tools like Metasploit and Burp Suite_ to become a Pentesting Agent
5 Premium Courses
28 hr 36 m
Get Started with Kali Linux Pentesting and Master Tools like ...
$99.00Hello
-
Career Path
Master Web Security for diving deeper into the Top Pentesting Tools and Enterprise Best Practices
5 Premium Courses
23 hr 43 m
Master Web Security for diving deeper into the Top Pentesting...
$99.00Hello
-
Vulnerability Assessment and Pentesting
Build a practical foundation of pentesting fundamentals using hands-on, practical, applied learning
Build a practical foundation of pentesting fundamentals using...
$59.99Beginner
7 hr 37 m
Hello
-
Vulnerability Assessment and Pentesting
Acquire hands-on skills needed for pentesting and hardening your GraphQL APIs
Acquire hands-on skills needed for pentesting and hardening y...
$99.99Intermediate
3 hr 0 m
Hello
-
Security Architecture and Operations
Master pfSense for effective network security and firewall management solutions.
Master pfSense for effective network security and firewall ma...
$99.99Beginner
4 hr 13 m
Hello
-
Security Architecture and Operations
Learn all about planning and implementing a Security Incident Response along with best practices and recommendations.
Learn all about planning and implementing a Security Incident...
$59.99Beginner
2 hr 0 m
Hello
-
Security Architecture and Operations
Learn how the main Fortress of the Network – a Firewall, has been evolved so far to protect us against invaders from the Cyber Space
Learn how the main Fortress of the Network – a Firewall, has ...
$49.99Advanced
6 hr 0 m
Hello
-
Vulnerability Assessment and Pentesting
Learn to build advanced functions and parameters in PowerShell
Learn to build advanced functions and parameters in PowerShel...
$59.99Intermediate
4 hr 0 m
Hello
-
Security Architecture and Operations
How to write a PowerShell module that contains functions to do logging for our scripts
How to write a PowerShell module that contains functions to d...
$69.99Intermediate
6 hr 1 m
Hello
-
Security Architecture and Operations
How to separate data from code in scripts and how to store configuration data in PowerShell
How to separate data from code in scripts and how to store co...
$59.99Intermediate
4 hr 0 m
Hello
-
Security Architecture and Operations
Remediate threats, new exploits, and ever-changing attack surface in PowerShell with its security best practices.
Remediate threats, new exploits, and ever-changing attack sur...
$59.99Intermediate
4 hr 0 m
Hello
-
Security Architecture and Operations
Step-by-Step Guide to Conducting a 62443-Based Risk Assessment in Industrial Control Systems (ICS).
Step-by-Step Guide to Conducting a 62443-Based Risk Assessmen...
$99.99Advanced
3 hr 3 m
Hello
-
Artificial Intelligence
Everyone can learn linear algebra but practical implementation of linear models is one of the essential key skills as a Machine Learning Engineer & we are going to master different concepts with application at the same time.
Everyone can learn linear algebra but practical implementatio...
$49.99Intermediate
4 hr 12 m
Hello
-
Skill Path
Unleash the power of artificial intelligence to achieve automation, predictions, analysis and better decision making.
8 Premium Courses
39 hr 48 m
Unleash the power of artificial intelligence to achieve autom...
$199.00Hello
-
Data Science
A complete Practical Approach to Blockchain & Smart Contracts using Node.js - JavaScript & Solidity - Ethereum - web3.js
A complete Practical Approach to Blockchain & Smart Contr...
$59.99Beginner
4 hr 53 m
Hello
-
Vulnerability Assessment and Pentesting
Learn to hunt for high-impact vulnerabilities and become a bug hunting pro, mastering bug bounties from recon to report!
Learn to hunt for high-impact vulnerabilities and become a bu...
$59.99Intermediate
4 hr 30 m
Hello
-
Software Development
Securing each attack surface logically across each Cisco UC application domain.
Securing each attack surface logically across each Cisco UC a...
$3.00Intermediate
0 hr 43 m
Hello
-
Security Architecture and Operations
Learn the Fundamentals of Cyber Threat Identification, Analysis, and Mitigation.
Learn the Fundamentals of Cyber Threat Identification, Analys...
$79.99Advanced
4 hr 1 m
Hello
-
Governance Risk and Compliance
Learn How to Foster a Privacy Culture in Your Organization, and Ultimately, Achieve Regulatory Compliance.
Learn How to Foster a Privacy Culture in Your Organization, a...
$59.99Beginner
3 hr 33 m
Hello
-
Cloud Security
Unleashing the Power of DevSecOps on Google Cloud Platform
Unleashing the Power of DevSecOps on Google Cloud Platform
$99.99Advanced
4 hr 0 m
Hello
-
DevSecOps
Secure CI/CD pipeline with Git
Secure CI/CD pipeline with Git
$49.99Advanced
4 hr 0 m
Hello
-
Governance Risk and Compliance
Empowering Defense Contractors to Safeguard National Security
Empowering Defense Contractors to Safeguard National Security...
$79.99Beginner
4 hr 0 m
Hello
-
Industrial Security Controls
Learn how to hack and exploit hardware from the foundations and become a great hardware pentesting expert.
Learn how to hack and exploit hardware from the foundations a...
$59.99Intermediate
4 hr 0 m
Hello
-
Cybersecurity
Your practical and offensive workshop for newcomers to ICS/OT Security 2023
Your practical and offensive workshop for newcomers to ICS/OT...
$59.99Intermediate
2 hr 0 m
Hello
-
Career Path
Learn how to apply and manage the most widespread cyber security risk management framework to any organization.
3 Premium Courses
15 hr 21 m
Learn how to apply and manage the most widespread cyber secur...
$199.00Hello
-
Industrial Security Controls
Conducting Reverse Engineering on Internet of Things Firmware for Fun and Profit
Conducting Reverse Engineering on Internet of Things Firmware...
$59.99Intermediate
2 hr 24 m
Hello