LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking
Poonam Devi
Basic Setup of FortiMail Mail Server
Dr. Hedaya Alasooly
Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools
Dr. Hedaya Alasooly
CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity
Poonam Devi
LEARN MPLS FROM SCRATCH PART-B - A Beginners guide to next level of networking
Poonam Devi
Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Ultimate VMware NSX for Professionals - Leverage Virtualized Networking Security and Advanced Services of VMware NSX for Efficient Data Management and Network Excellence
Vinay Aggarwal
Virtualization Power Pack: Novice To Ninja - Mastering VMware Virtualbox Parallels Citrix
Rob Botwright
Pentesting Active Directory and Windows-based Infrastructure - A comprehensive practical guide to penetration testing Microsoft infrastructure
Denis Isakov
OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence
Rob Botwright
Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers
Rob Botwright
AZ-104: Azure Administrator Mastery
Rob Botwright
Gray Hat - Vulnerability Scanning & Penetration Testing
Rob Botwright
Ethical Hacking Workshop - Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
Rishalin Pillay, Mohammed Abutheraa
Malware Analysis - Digital Forensics Cybersecurity And Incident Response
Rob Botwright
Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques
Muhiballah Mohammed
Burp Suite Cookbook - Web application security made easy with Burp Suite
Dr. Sunny Wear
Zero Trust Security - Building Cyber Resilience & Robust Security Postures
Rob Botwright
Ultimate Web Authentication Handbook - Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth SAML and FIDO
Sambit Kumar Dash
Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses
Rob Botwright
IT Networking: A Comprehensive Guide
Christopher Ford
The Art of Social Engineering - Uncover the secrets behind the human dynamics in cybersecurity
Cesar Bravo, Desilda Toska
Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain
Taha Sajid
LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking
Poonam Devi
Shadows of the Abyss: Unveiling the Dark Web
Christopher Ford
Safeguarding the Digital Fortress: A Guide to Cyber Security
Christopher Ford
Effective Threat Investigation for SOC Analysts - The ultimate guide to examining various threats and attacker techniques using security logs
Mostafa Yahia
Cloud Security Handbook for Architects - Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps
Ashish Mishra
Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful pentesting
Glen D. Singh
Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications
Stian Thorgersen, Pedro Igor Silva