-
Deep dive into Large Language Models (LLMs), including their architecture, applications, and security challenges. Explore offensive strategies like API exploitation and prompt injection, as well as defensive techniques like input sanitization and model guardrails.$99.99
Hello
Vulnerability Assessment and Pentesting
Deep dive into Large Language Models (LLMs), including their architecture, applications, and security challenges. Explore offensive strategies like API exploitation and prompt injection, as well as defensive techniques like input sanitization and model guardrails.$69.99Advanced
1 hr 56 m
Hello
Vulnerability Assessment and Pentesting
Deep dive into Large Language Models (LLMs), including their architecture, applications, and security challenges. Explore offensive strategies like API exploitation and prompt injection, as well as defensive techniques like input sanitization and model guardrails.$99.99Beginner
1 hr 56 m
Hello
Vulnerability Assessment and Pentesting
100’s of millions of devices and services at risk and defenders have to scramble!
100’s of millions of devices and services at risk and defende...
$59.99Intermediate
2 hr 21 m
Hello
Security Architecture and Operations
Get started with learning terminal commands on your Mac and Linux system.
Get started with learning terminal commands on your Mac and L...
$49.99Beginner
3 hr 17 m
Hello
Industrial Security Controls
Learn all the security recommendations for a mac device in a company and how to apply them.
Learn all the security recommendations for a mac device in a ...
$49.99Intermediate
4 hr 0 m
Hello
Security Architecture and Operations
Unlocking the Potential of Machine Learning: From Theory to Practice
Unlocking the Potential of Machine Learning: From Theory to P...
$99.99Intermediate
4 hr 0 m
Hello
Artificial Intelligence
Understand and build ML-based solutions using Python!
Understand and build ML-based solutions using Python!
$59.99Intermediate
4 hr 8 m
Hello
Cybersecurity
Explore how to find, analyze, and reverse engineer malware.
Explore how to find, analyze, and reverse engineer malware.
$59.99Beginner
4 hr 22 m
Hello
Cybersecurity
Explore how to find, analyze, and reverse engineer malware.
Explore how to find, analyze, and reverse engineer malware.
$4.99Beginner
4 hr 22 m
Hello
Vulnerability Assessment and Pentesting
A Beginner's Course on Analyzing Malicious PDF and Microsoft Office Documents Using Remnux and Windows Virtual Machines
A Beginner's Course on Analyzing Malicious PDF and Microsoft ...
$69.99Beginner
4 hr 24 m
Hello
Cloud Security
Reduce the effort to maintain an infrastructure of Hyper-V nodes using Nano Server
Reduce the effort to maintain an infrastructure of Hyper-V no...
$49.99Beginner
6 hr 28 m
Hello
Cloud Security
Learn how to implement EC2 and VPC resources on AWS using Python API - Boto3! Implement your infrastructure with code!
Learn how to implement EC2 and VPC resources on AWS using Pyt...
$69.99Intermediate
4 hr 30 m
Hello
Cloud Security
Azure DevOps - Boards, Stories, Repos, Pipeline, YAML based CI-CD, Deployment, Build Agents, Build, deploy and release
Azure DevOps - Boards, Stories, Repos, Pipeline, YAML based C...
$49.99Intermediate
4 hr 0 m
Hello
Hello
Professional CertificationSoftware Development
Use Python to learn algebra, calculus, graphing, trigonometry and more math topics!
Use Python to learn algebra, calculus, graphing, trigonometry...
$79.99Intermediate
37 hr 0 m
Hello
Skill PathMaster the art of gathering intelligence from published sources to support your intelligence needs
3 Premium Courses
14 hr 50 m
Master the art of gathering intelligence from published sourc...
$149.00Hello
Software Development
Learn to implement automation testing using selenium and build industry standard automation frameworks from scratch
Learn to implement automation testing using selenium and buil...
$69.99Intermediate
12 hr 30 m
Hello
Security Architecture and Operations
Easily capture Wi-Fi passwords using Evil Twin Attacks and also build your own Evil Twin Systems from scratch.
Easily capture Wi-Fi passwords using Evil Twin Attacks and al...
$79.99Intermediate
3 hr 23 m
Hello
Software Development
Securing and Automating Linux and Windows Systems with Advanced Ansible Playbooks
Securing and Automating Linux and Windows Systems with Advanc...
$99.99Advanced
5 hr 34 m
Hello
Software Development
Your Complete Guide to Installing and Configuring Ansible Across Linux Distributions
Your Complete Guide to Installing and Configuring Ansible Acr...
$99.99Beginner
3 hr 55 m
Hello
Security Architecture and Operations
Unlock advanced threat analysis with ChatGPT: A hands-on guide for beginners to experts. Dive deep into OSINT, malware analysis, and real-world applications. Turn insights into actions!
Unlock advanced threat analysis with ChatGPT: A hands-on guid...
$69.99Intermediate
3 hr 0 m
Hello
Vulnerability Assessment and Pentesting
Learn how to identify, enumerate, and exploit SQL databases and NoSQL databases to PWN modern web applications.
Learn how to identify, enumerate, and exploit SQL databases a...
$59.99Advanced
4 hr 0 m
Hello
Learn how to identify, enumerate, and exploit SQL databases and NoSQL databases to PWN modern web applications.
Learn how to identify, enumerate, and exploit SQL databases a...
$59.99Hello
Learn how to identify, enumerate, and exploit SQL databases and NoSQL databases to PWN modern web applications.
Learn how to identify, enumerate, and exploit SQL databases a...
$6.66Hello
Skill PathDetect and backtrack cyber criminals and hackers with digital forensics
3 Premium Courses
10 hr 33 m
Detect and backtrack cyber criminals and hackers with digital...
$199.00Hello
Detect and backtrack cyber criminals and hackers with digital forensics
Detect and backtrack cyber criminals and hackers with digital...
$17.99Hello
Vulnerability Assessment and Pentesting
Gain hands-on knowledge of the infamous Follina vulnerability and how to protect yourself against it.
Gain hands-on knowledge of the infamous Follina vulnerability...
$99.99Intermediate
1 hr 42 m
Hello
DevSecOps
Secure Kubernetes with Istio - Your Hands-On Guide to Istio Service Mesh
Secure Kubernetes with Istio - Your Hands-On Guide to Istio S...
$79.99Intermediate
4 hr 0 m
Hello
Security Architecture and Operations
Kickstart your journey to passing the Exam SC-200: Microsoft Security Operations Analyst examination by learning how to mitigate threats using Microsoft 365 Defender.
Kickstart your journey to passing the Exam SC-200: Microsoft ...
$49.99Intermediate
3 hr 0 m
Hello
Security Architecture and Operations
Get one step closer to passing the SC-200: Microsoft Security Operations Analyst Exam by mastering threat mitigation using Defender for Cloud and Microsoft Sentinel.
Get one step closer to passing the SC-200: Microsoft Security...
$99.99Advanced
4 hr 0 m
Hello
DevSecOps
Mastering React Native: JavaScript Essentials, Core Concepts, Styling Techniques, and App Navigation
Mastering React Native: JavaScript Essentials, Core Concepts,...
$49.99Intermediate
3 hr 30 m
Hello
Skill PathLearn how hackers attack phones, mobile applications, and mobile devices with the latest technology, and protect yourself
3 Premium Courses
27 hr 35 m
Learn how hackers attack phones, mobile applications, and mob...
$149.00Hello
Security Architecture and Operations
Hands-on detection engineering leveraging Suricata, PCAP forensics, and automation
Hands-on detection engineering leveraging Suricata, PCAP fore...
$99.99Intermediate
7 hr 36 m
Hello
- Choosing a selection results in a full page refresh.
- Opens in a new window.