Pentesting Active Directory and Windows-based Infrastructure - A comprehensive practical guide to penetration testing Microsoft infrastructure
Denis Isakov
OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence
Rob Botwright
Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers
Rob Botwright
AZ-104: Azure Administrator Mastery
Rob Botwright
Gray Hat - Vulnerability Scanning & Penetration Testing
Rob Botwright
Ethical Hacking Workshop - Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
Rishalin Pillay, Mohammed Abutheraa
Malware Analysis - Digital Forensics Cybersecurity And Incident Response
Rob Botwright
Burp Suite Cookbook - Web application security made easy with Burp Suite
Dr. Sunny Wear
Zero Trust Security - Building Cyber Resilience & Robust Security Postures
Rob Botwright
Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques
Muhiballah Mohammed
Ultimate Web Authentication Handbook - Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth SAML and FIDO
Sambit Kumar Dash
Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses
Rob Botwright
IT Networking: A Comprehensive Guide
Christopher Ford
The Art of Social Engineering - Uncover the secrets behind the human dynamics in cybersecurity
Cesar Bravo, Desilda Toska
LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking
Poonam Devi
Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain
Taha Sajid
Shadows of the Abyss: Unveiling the Dark Web
Christopher Ford
Safeguarding the Digital Fortress: A Guide to Cyber Security
Christopher Ford
Effective Threat Investigation for SOC Analysts - The ultimate guide to examining various threats and attacker techniques using security logs
Mostafa Yahia
Cloud Security Handbook for Architects - Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps
Ashish Mishra
Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful pentesting
Glen D. Singh
Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications
Stian Thorgersen, Pedro Igor Silva
Mastering Microsoft 365 Defender - Implement Microsoft Defender for Endpoint Identity Cloud Apps and Office 365 and respond to threats
Ru Campbell, Viktor Hedberg
Security Orchestration Automation and Response for Security Analysts - Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
Benjamin Kovacevic
Evaluation of Some SMTP Testing Email Verification Header Analysis SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools
Dr. Hidaia Mahmood Alassouli
Implementing Multifactor Authentication - Protect your applications from cyberattacks with the help of MFA
Marco Fanti
10 Machine Learning Blueprints You Should Know for Cybersecurity - Protect your systems and boost your defenses with cutting-edge AI techniques
Rajvardhan Oak
Mastering Veeam Backup & Replication - Design and deploy a secure and resilient Veeam 12 platform using best practices
Chris Childerhose
Digital Forensics with Kali Linux - Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022x 3rd Edition
Shiva V. N. Parasram
Zed Attack Proxy Cookbook - Hacking tactics techniques and procedures for testing web applications and APIs
Ryan Soper, Nestor N Torres, Ahmed Almoailu