-
Cloud Security
Understanding the fundamentals of serverless architecture, plans and features and how Azure App service is different from conventional deployment.
Understanding the fundamentals of serverless architecture, pl...
$49.99Beginner
4 hr 0 m
Hello
-
Vulnerability Assessment and Pentesting
Learn how to hack Android apps and obtain Android bug bounties
Learn how to hack Android apps and obtain Android bug bountie...
$59.99Advanced
1 hr 58 m
Hello
-
Industrial Security Controls
Unlock Success: Common IoT attacks and vulnerabilities and how to remediate them
Unlock Success: Common IoT attacks and vulnerabilities and ho...
$99.99Beginner
0 hr 39 m
Hello
-
Security Architecture and Operations
The basics of securing data, voice, and media transfers over telecom networks.
The basics of securing data, voice, and media transfers over ...
$99.99Beginner
3 hr 57 m
Hello
-
Security Architecture and Operations
Step-by-Step Configuration Demo of Check Point Management Server R81 in a PNET Lab environment in 1 Hour.
Step-by-Step Configuration Demo of Check Point Management Ser...
$79.99Intermediate
1 hr 0 m
Hello
-
Security Architecture and Operations
Jump-start your cybersecurity career from the gateway to success: A SOC Analyst (2024)
Jump-start your cybersecurity career from the gateway to succ...
$99.99Beginner
3 hr 51 m
Hello
-
Cloud Security
Strengthen the security of your Oracle Database environments with in-built and external security measures.
Strengthen the security of your Oracle Database environments ...
$49.99Intermediate
6 hr 30 m
Hello
-
Vulnerability Assessment and Pentesting
Learn pentesting with complete hands-on practical course
Learn pentesting with complete hands-on practical course
$59.99Advanced
3 hr 40 m
Hello
-
Cybersecurity
Gain the skills to perform network assessments, using popular tools and strategies.
Gain the skills to perform network assessments, using popular...
$59.99Intermediate
3 hr 58 m
Hello
-
Vulnerability Assessment and Pentesting
The comprehensive course to perform MITM attacks against the connected clients & protect them from all of these attacks.
The comprehensive course to perform MITM attacks against the ...
$59.99Beginner
2 hr 46 m
Hello
-
Cloud Security
Learn to deploy code quickly, efficiently, and seamlessly while reducing errors and limiting downtime.
Learn to deploy code quickly, efficiently, and seamlessly whi...
$49.99Intermediate
4 hr 0 m
Hello
-
Cybersecurity
Explore modern malware families and techniques and learn how they are used in the “real world”
Explore modern malware families and techniques and learn how ...
$59.99Beginner
1 hr 23 m
Hello
-
Security Architecture and Operations
Safeguard your privacy and identity while surfing online by setting up your own VPN server in the region of your choice.
Safeguard your privacy and identity while surfing online by s...
$49.99Beginner
1 hr 40 m
Hello
-
Security Architecture and Operations
Master Ethical Hacking, Bug Bounty Techniques, and Real-world Exploits
Master Ethical Hacking, Bug Bounty Techniques, and Real-world...
$99.99Intermediate
3 hr 20 m
Hello
-
Vulnerability Assessment and Pentesting
Learn to use Metasploit in this beginner-friendly and hands-on course
Learn to use Metasploit in this beginner-friendly and hands-o...
$79.99Advanced
12 hr 48 m
Hello
-
Software Development
Protect your containers and Kubernetes deployments with OWASP Top 10 security guidelines.
Protect your containers and Kubernetes deployments with OWASP...
$59.99Intermediate
2 hr 45 m
Hello
-
Cybersecurity
Learn the most recommended practices to investigate a computer, that contains evidence in both criminal and civil investigations
Learn the most recommended practices to investigate a compute...
$59.99Intermediate
4 hr 0 m
Hello
-
Security Architecture and Operations
Wireshark Advanced Usage for Troubleshooting
Wireshark Advanced Usage for Troubleshooting
$49.99Intermediate
10 hr 27 m
Hello
-
Security Architecture and Operations
Develop ”Out-of-box” thinking related to web secure coding and see security from an offensive perspective.
Develop ”Out-of-box” thinking related to web secure coding an...
$99.99Intermediate
4 hr 48 m
Hello
-
Security Architecture and Operations
Learn the Fundamentals of Cyber Threat Identification, Analysis, and Mitigation.
Learn the Fundamentals of Cyber Threat Identification, Analys...
$79.99Advanced
4 hr 1 m
Hello
-
Cloud Security
Container and Pods security in Kubernetes environments with blending theory and practical knowledge along with Continuous Compliancy
Container and Pods security in Kubernetes environments with b...
$59.99Intermediate
4 hr 30 m
Hello
-
Security Architecture and Operations
Learn advanced and powerful techniques on how to secure your Microsoft database environment, prevent attacks and unauthorized access.
Learn advanced and powerful techniques on how to secure your ...
$99.99Intermediate
4 hr 40 m
Hello
-
Data Science
Master Tableau Calculations and Create Your Own Dashboards!
Master Tableau Calculations and Create Your Own Dashboards!
$49.99Beginner
2 hr 30 m
Hello
-
Cloud Security
Use Microsoft Azure and combine your on-premises identity solution with cloud-based systems to implement a secure hybrid identity solution.
Use Microsoft Azure and combine your on-premises identity sol...
$49.99Intermediate
4 hr 0 m
Hello
-
Vulnerability Assessment and Pentesting
Enhance Your Organization’s Management of its Supply Chain Risks
Enhance Your Organization’s Management of its Supply Chain Ri...
$59.99Beginner
3 hr 45 m
Hello
-
Software Development
Create a dynamic image gallery getting images from your Google Drive Folder and placing them on your website via JavaScript.
Create a dynamic image gallery getting images from your Googl...
$49.99Beginner
1 hr 0 m
Hello
-
Software Development
Learn Python Programming from Very Basics to Intermediate Level With 20+ Practical Projects
Learn Python Programming from Very Basics to Intermediate Lev...
$59.99Beginner
3 hr 0 m
Hello
-
Artificial Intelligence
Everyone can learn linear algebra but practical implementation of linear models is one of the essential key skills as a Machine Learning Engineer & we are going to master different concepts with application at the same time.
Everyone can learn linear algebra but practical implementatio...
$49.99Intermediate
4 hr 12 m
Hello
-
Governance Risk and Compliance
Learn how to become a great Data Protection Officer (DPO) under GDPR - Step by Step with examples (CIPT, CIPM, CIPP/E)
Learn how to become a great Data Protection Officer (DPO) und...
$69.99Intermediate
3 hr 35 m
Hello
-
Data Science
A data-driven approach to classification
A data-driven approach to classification
$59.99Beginner
3 hr 9 m
Hello
-
Artificial Intelligence
A Perfect Beginners guide to learning and understanding General Quantum Computing based on IBM Qiskit Documentation
A Perfect Beginners guide to learning and understanding Gener...
$59.99Beginner
5 hr 20 m
Hello
-
Software Development
A complete guide to build your first game for Windows, Linux, OS X and Mobile using RPG Maker MV
A complete guide to build your first game for Windows, Linux,...
$59.99Beginner
5 hr 30 m
Hello
-
Vulnerability Assessment and Pentesting
Jq Command Tutorials to parse JSON Data (to read and write JSON Data) for Bash Shell Scripting
Jq Command Tutorials to parse JSON Data (to read and write JS...
$59.99Intermediate
2 hr 17 m
Hello
-
Security Architecture and Operations
Discover how Network Virtualization Techniques Can Improve the Security of your Organization.
Discover how Network Virtualization Techniques Can Improve th...
$49.99Intermediate
2 hr 54 m
Hello
-
Vulnerability Assessment and Pentesting
Complete Ethical Hacking with Nmap for Network Security, Penetration Testing, and Bug Bounties
Complete Ethical Hacking with Nmap for Network Security, Pene...
$69.99Beginner
7 hr 0 m
Hello
-
Vulnerability Assessment and Pentesting
Gain hands-on knowledge of the infamous Follina vulnerability and how to protect yourself against it.
Gain hands-on knowledge of the infamous Follina vulnerability...
$99.99Intermediate
1 hr 42 m
Hello