Build an effective machine learning project to detect instances of financial crime.
Learn Java network programming by practical example applications |You will develop Client Server,GUI Chat and other apps
Learn to administrate your fortigate Firewall in both NAT and Transparent Mode
Understand and configure VLAN and VXLAN on different MikroTik products (RB, CRS & CSS) using RouterOS and SwOS
A comprehensive coverage of Virtual Private Networks from basic level to advanced
本講座ではペネトレーションテスターとして、アクセス制御されたシステムにアクセスするための権限取得に関する方法論について学びます。具体的な攻撃手法を習得するために「TryHackMe」と「Hack The Box」を使った演習を行います。
Hands-On Course - Kafka Security Setup in AWS with SSL Encryption & Authentication, SASL Kerberos, ACL in Zookeeper
Learn How to Find Award-Winning XSSs in Modern Web Applications
The most comprehensive entry guide to ethical hacking out there .
Learn FortiGate Firewall NSE4 Version 7 with Step by Step Lab Workbook
Fortinet Network Security Essentials
Learn about SDN, OpenFlow, Mininet, POX Controller, Creating SDN Applications, ovs-ofctl, Custom Topologies & Wireshark
Learn how to create your own malware & computer virus from zero. Advance your hacking skills.
Practical guide to pentesting REST APIs from scratch
Learn how hackers attack phones, mobile applications and mobile devices with latest technology and protect yourself!
Learn everything about Internet - Ethernet, IP, Routing, Switching, TCP, UDP, NAT, DHCP and DNS, prepare for CCNA exam
Learn LDAP in Professional way from Scratch. Become an expert in Directory Services, from ZERO to HERO!
DevSecOps Basics & Fundamentals in Depth | Grow from Beginner to Advanced | Learn SAST, SCA, IAC, Container & DAST
SQL Injection, XSS prevention, HMAC, JWT, JWE, Oauth2, Okta, Denial of Service (DoS), and more about API security
Primo do tamagochi conhecido como bichinho virtual
Start from 0 & learn both topics Red team and Blue team. The only course you can learn about how TA hack organization
Basics of Computer Security Concepts and Techniques
Get modern blue team skills for finding covert threats in enterprise networks.