Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications
Stian Thorgersen, Pedro Igor Silva
Mastering Microsoft 365 Defender - Implement Microsoft Defender for Endpoint Identity Cloud Apps and Office 365 and respond to threats
Ru Campbell, Viktor Hedberg
Evaluation of Some SMTP Testing Email Verification Header Analysis SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools
Dr. Hidaia Mahmood Alassoulii
Python for Security and Networking - Leverage Python modules and tools in securing your network and applications
José Manuel Ortega
Windows Ransomware Detection and Protection - Securing Windows endpoints the cloud and infrastructure using Microsoft Intune Sentinel and Defender
Marius Sandbu
Microsoft Defender for Endpoint in Depth - Take any organization's endpoint security to the next level
Paul Huijbregts, Joe Anich, Justen Graves
Cybersecurity Blue Team Strategies - Uncover the secrets of blue teams to combat cyber threats in your organization
Kunal Sehgal, Nikolaos Thymianis
Cybersecurity Threats Malware Trends and Strategies - Discover risk mitigation strategies for modern threats to your organization
Tim Rains
Machine Learning Security Principles - Keep data networks users and applications safe from prying eyes
John Paul Mueller
Digital Forensics and Incident Response - Incident response tools and techniques for effective cyber threat response
Gerard Johansen
An Ethical Guide to Cyber Anonymity - Concepts tools and techniques to protect your anonymity from criminals unethical hackers and governments
Kushantha Gunawardana
Basic Setup of FortiMail Mail Server
Dr. Hidaia Mahmood Alassoulii
Cybersecurity – Attack and Defense Strategies 3rd edition - Improve your security posture to mitigate risks and prevent attackers from infiltrating your system
Yuri Diogenes, Dr. Erdal Ozkaya
Hack the Cybersecurity Interview - A complete interview preparation guide for jumpstarting your cybersecurity career
Ken Underhill, Christophe Foulon, Tia Hopkins
Operationalizing Threat Intelligence - A guide to developing and operationalizing cyber threat intelligence programs
Kyle Wilhoit, Joseph Opacki
The Foundations of Threat Hunting - Organize and design effective cyber threat hunts to meet business needs
Chad Maurice, Jeremy Thompson, William Copeland
iOS Forensics for Investigators - Take mobile forensics to the next level by analyzing extracting and reporting sensitive evidence
Gianluca Tiepolo
Incident Response Techniques for Ransomware Attacks - Understand modern ransomware attacks and build an incident response strategy to work through them
Oleg Skulkin
Practical Memory Forensics - Jumpstart effective forensic analysis of volatile memory
Oleg Skulkin, Svetlana Ostrovskaya
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide - Manage monitor and respond to threats using Microsoft Security Stack for securing IT systems
Joe Anich, Trevor Stuart
The Cybersecurity Playbook for Modern Enterprises - An end-to-end guide to preventing data breaches and cyber attacks
Jeremy Wittkop
Agile Security Operations - Engineering for agility in cyber defense detection and response
Hinne Hettema
Cybersecurity Leadership Demystified - A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
Dr. Erdal Ozkaya
Mastering Defensive Security - Effective techniques to secure your Windows Linux IoT and cloud infrastructure
Cesar Bravo
Penetration Testing Azure for Ethical Hackers - Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
David Okeyode, Karl Fosaaen
Privilege Escalation Techniques - Learn the art of exploiting Windows and Linux systems
Alexis Ahmed
Cybersafe For Humans - A Simple Guide to Keep You and Your Family Safe Online
Patrick Acheampong
Cybersafe for Business - The Anti-Hack Handbook for SMEs
Patrick Acheampong
Cybersecurity Career Master Plan - Proven techniques and effective tips to help you advance in your cybersecurity career
Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, Kim Nguyen
Antivirus Bypass Techniques - Learn practical techniques and tactics to combat bypass and evade antivirus software
Nir Yehoshua, Uriel Kosayev