- All
- Deals
- Coupons
- Sales
- Expired
Cyber Security & Ethical Hacking Online Course, Understanding Cyber Threats & Ethical Hacking Techniques for Secure Digital Systems.
Course Description
Overview:
In today’s ...
ISO 27001:2022 Advanced ISMS Auditing Techniques Workshop, Master ISO 27001:2022 auditing techniques, risk-based ISMS audits, Annex A controls, CAPA reviews, and improvement.
Course Description
...
Burp Suite: In Depth Survival Guide, Master The Art Of Burp Suite Now.
Course Description
Introduction
This course forms both the basics and advanced use cases of Burp Suite into an ...
Automated Incident Response: From Detection to Mitigation, Transform your cybersecurity approach with automated incident response—detect, contain, and mitigate threats faster!.
Course Description
...
2023 Employee CyberSecurity Awareness First Line of Defense, Knowledge that every employee must have. Learn how to protect your company data from hackers and unauthorized access.
Course Description
...
Ethically Hack the Planet Part 3, Secure the world.
Course Description
Are you fascinated by the world of ethical hacking and cybersecurity? Ready to take your skills to the next level? ...
Data Center Infrastructure & Design: Operation & Maintenance, Data Center Infrastructure Maintenance/Data Center Infrastructure Operation/Data Center Infrastructure Design Management.
Course ...
Ethical Hacking: Post-Exploitation, Hack Windows and Linux.
What you will learn?
Crack Passwords
Hack Windows 7
Hack Linux
Get System Info
Course Requirements
...
Hack Network PCs, Hack that Network.
Course Description
Network PC's are devices that allow users to connect their computers to the internet via the (wireless) networks. There are many ...
Ethical Hacking: Exploit Linux Server, Hack a Linux Server.
Course Description
Linux has been used for many things including servers. Companies use Linux servers for data storage; these ...
Web Forensics: A Hands-On Guide to Investigate Online Crime, Investigate cybercrimes with web forensics — learn evidence collection, analysis, legal handling, and real-world tools.
Course ...
OWASP Top 10 for LLM Applications – 2025 Edition, Master LLM security: prompt injection defense, output filtering, plugin safeguards, red teaming, and risk mitigation.
Course Description
...
Google Cloud Apigee X API Management - Hands-On Training, Learn the Core of API Management with Google Cloud Apigee X in Just 3 hours.
Course Description
This is a beginner level course ...
GenAI Cybersecurity: OWASP Top 10, MITRE ATLAS & API Attacks, Master GenAI & LLM cybersecurity, OWASP, MITRE ATLAS mappings, and API attack techniques – practical demos included.
Course ...
Practical Cisco Networking Labs in Cisco Packet Tracer, Networking concepts explained in a simple way, with many engaging exercises.
Course Description
This course's goal is to teach you some of ...
Cisco SDA "Software Defined Access" Hands-On, Cisco SD-Access Hands On (Full Course).
Course Description
Cisco SD-Access "Software-Defined Access" Hands On, will take you step by step on ...
Cisco Packet Tracer: Routing & Switching Labs, Master core networking concepts through real-world labs using Cisco Packet Tracer – perfect for CCNA students.
Course Description
...
Python for Ethical Hacking and Penetration Testing, Master Python from scratch and build 15+ hands-on cybersecurity tools for ethical hacking and penetration testing.
Course Description
...
Information Security Fundamentals, The very basics of InfoSec.
Course Description
This course is meant for anyone curious about InfoSec and just starting out in this field. Terminology and ...
Computer Networks Fundamentals, Use this course to cover your Computer Networking basics.
Course Description
Computer Networks Fundamentals is a course that will help you get off the ground with ...
Identify and Prevent Phishing Attacks: Before They Harm You, Cyber Security Training: Easily Identify E-mail and Mobile Scams BEFORE your corporate or personal data is breached!
Course Description
...
Ethical Hacking: Web Hacking Intro, Web Hacking 101.
Course Description
Welcome to "Hack Simple Websites" – your gateway into the intriguing world of ethical hacking!
As the internet ...
Mac Security Masterclass, Fortify Mac. Crush Cyber Threats.
Course Description
Worried about hackers infiltrating your Mac? You're not alone—tons of folks get hit every year! But hey, no ...
Malware Analysis, Malware Analysis For Beginners.
Course Description
Malware analysis is the use of tools and programs to understand the behavior and purpose of suspicious files. The ...
Ethical Hacking: Hack Android, Android Hacking with APKs.
Course Description
Gear up for the hottest hacking journey: Hack Android. This course is your key to becoming a hacking ...
GenAI Cybersecurity Solutions, Securing Generative AI Systems: Effective Cybersecurity Strategies and Tools.
Course Description
n the era of artificial intelligence, securing Generative ...
Introduction to Web Application Penetration Testing, Learn how to perform penetration tests on web applications for bug bounty hunting and exploit a potential vulnerability.
Course Description
...
Network Security with Arista (Untangle) NG Firewall - 2025. Enhance Network Security with Arista (Formerly Untangle) Firewall NGFW, Installation, Configuration, and More.
Course Description
...
pfSense: Network Security and Firewall Management, Open Source Next Generation Firewall.
Course Description
Are you ready to take your network security skills to the next level? "pfSense: ...
OPNsense Firewall: Complete Guide to Network Security, Master OPNsense Firewall | Setup, Security, VPNs, IDS/IPS & More | Hands-On Guide for Network Security & Protection.
Course Description ...
Show next