Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools
Dr. Hedaya Alasooly
Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WP Email Tools - Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools
Dr. Hedaya Alasooly
LEARN MPLS FROM SCRATCH PART-B - A Beginners guide to next level of networking
Poonam Devi
LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking
Poonam Devi
Basic Setup of FortiMail Mail Server
Dr. Hedaya Alasooly
Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Ultimate VMware NSX for Professionals - Leverage Virtualized Networking Security and Advanced Services of VMware NSX for Efficient Data Management and Network Excellence
Vinay Aggarwal
Virtualization Power Pack: Novice To Ninja - Mastering VMware Virtualbox Parallels Citrix
Rob Botwright
Pentesting Active Directory and Windows-based Infrastructure - A comprehensive practical guide to penetration testing Microsoft infrastructure
Denis Isakov
OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence
Rob Botwright
Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers
Rob Botwright
AZ-104: Azure Administrator Mastery
Rob Botwright
Gray Hat - Vulnerability Scanning & Penetration Testing
Rob Botwright
Ethical Hacking Workshop - Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
Rishalin Pillay, Mohammed Abutheraa
Malware Analysis - Digital Forensics Cybersecurity And Incident Response
Rob Botwright
Zero Trust Security - Building Cyber Resilience & Robust Security Postures
Rob Botwright
Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques
Muhiballah Mohammed
Burp Suite Cookbook - Web application security made easy with Burp Suite
Dr. Sunny Wear
Ultimate Web Authentication Handbook - Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth SAML and FIDO
Sambit Kumar Dash
Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses
Rob Botwright
IT Networking: A Comprehensive Guide
Christopher Ford
The Art of Social Engineering - Uncover the secrets behind the human dynamics in cybersecurity
Cesar Bravo, Desilda Toska
LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking
Poonam Devi
Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain
Taha Sajid
Safeguarding the Digital Fortress: A Guide to Cyber Security
Christopher Ford
Shadows of the Abyss: Unveiling the Dark Web
Christopher Ford
Effective Threat Investigation for SOC Analysts - The ultimate guide to examining various threats and attacker techniques using security logs
Mostafa Yahia
Cloud Security Handbook for Architects - Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps
Ashish Mishra
Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful pentesting
Glen D. Singh
Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications
Stian Thorgersen, Pedro Igor Silva