Learn Python and Ethical Hacking from Scratch | Packt
Start from scratch and build up to a high-intermediate level Model problems, design solutions and implement them using Python Write cross-platform programs that work on Windows, OS X, and Linux Gain a...
View ArticleApache Kafka Complete Developer’s Guide | Udemy
Understand how Apache Kafka works Create fault-tolerant clusters with topics replication across multiple brokers Apache Kafka Architecture How to create Kafka cluster with multiple Brokers Practice to...
View Article[Update Links] Offensive Security – Cracking The Premiter (CTP)
Cracking the Perimeter (CTP) is the next step for penetration testers who have completed PWK. This online, self-paced ethical hacking course is among the most challenging available. CTP focuses more on...
View ArticleMaster Kubernetes with Docker on Google Cloud, AWS & Azure | Udemy
Simplify DevOps with Docker and Kubernetes for 6 Java Spring Boot Applications Use Kubernetes to orchestrate Docker based Java Spring Boot Microservices Learn Kubernetes and Docker Concepts – Images,...
View ArticleMaster DevOps with Docker, Kubernetes and Azure DevOps | Udemy
You will learn DevOps with Docker, Kubernetes and Azure DevOps from ZERO, no previous experience required You will learn the fundamentals of 6 Most Popular DevOps Tools – Docker, Kubernetes, Azure...
View ArticleWindows Command Line (cmd) & Batch Script Management | Udemy
How to create, rename, move and delete files and directories. The different types of file systems and how to navigate between directories Setting the date and time on your PC using the date, time and...
View ArticleComplete Metasploit Course: Beginner to Advance | Udemy
Metasploit Basics Learn and Understand Metasploit Hacking using Metasploit Launching Attacks Using Metasploit Intelligence Gathering and Scanning Vulnerability Scanning Metasploit Auxiliary Modules...
View ArticleContinuous integration with Jenkins | Udemy
Install Jenkins CI server on Google Cloud Platform Understand the basics of continuous integration, continuous delivery and continuous deployment Install and configure several tools commonly used with...
View ArticleComplete Cyber Security Masterclass: Beginner to Advance | Udemy
Basics Of Cyber Security Launch Cyber Security Atatcks Advanced Of Cyber Security Network Scanning Sniffing Spoffing Attack DOS and DDOS Attack Password Hacking Buffer Overflow Cryptography Attacking...
View ArticleAzure AZ-900 – Microsoft Fundamentals Training Bootcamp 2020 | Udemy
Pass the Microsoft Azure Fundamentals AZ-900 Exam Earn the Microsoft Certified Azure Fundamentals Badge All 500+ Slides Available as Downloadable PDF Download Course Audiobook and Learn on the go...
View ArticleAWS EC2 Auto Scaling | Udemy
AWS cloud computing This course will focus on a very powerful and important concept of auto scaling in AWS. Students will learn by lectures and hands-on demos on how to apply the AS concepts in the...
View ArticleProfessor Messer’s Nmap Secrets Training Course
Nmap or Network Mapper is the tools to conduct a networking mapping. Using Nmap, one can know whether computer or host active and obtain further information about the target. Nmap is available in a...
View ArticleMastering Linux Command Line | Packt
Understand the Linux command line from the bottom up Explore the Linux filesystem and navigation Work with file attributes and permissions Learn Vi Editor and its practical uses Use cron to schedule...
View ArticleCloud Hadoop: Scaling Apache Spark | Linkedin
Apache Hadoop and Spark make it possible to generate genuine business insights from big data. The Amazon cloud is natural home for this powerful toolset, providing a variety of services for running...
View ArticleAWS: Networking | Linkedin
Adopting a cloud infrastructure strategy includes configuring a network that meets the needs of your organization. Amazon Web Services (AWS) is a cost-reducing solution that provides tools so you can...
View ArticleCisco CCNP Enterprise ENCOR (350-401) | ITProTV
ITProTV’s Cisco CCNP Enterprise ENCOR (350-401) will help you to learn and prepare for the associated exam—Implementing Cisco Enterprise Network Core Technologies v1.0 (ENCOR 350-401). This exam is the...
View ArticleCloud Academy – Implementing Azure Backups
Cloud Academy – Implementing Azure Backups-STMEnglish | Size: 476.74 MBCategory: Tutorial As the move to the cloud continues at a record pace understanding how to properly backup and recover Azure...
View ArticlePractical Threat Hunting
Practical Threat Hunting is for you if You’ve ever sat at a screen feeling paralyzed by not knowing what to look for next. You’ve always wanted to be able to find evil on your network without alerts,...
View ArticleCompTIA PenTest+ Certification Passport (Exam PT0-001)
This effective self-study guide serves as an accelerated review of all exam objectives for the CompTIA PenTest+ certification exam This concise, quick-review test preparation guide offers 100% coverage...
View ArticleELK for Security Analysis | Networkdefense
ELK is Elasticsearch, Logstash, and Kibana and together they provide a framework for collecting, storing, and investigating network security data. In this course, you’ll learn how to use this powerful...
View Article