Evaluation of Some SMTP Testing Email Verification Header Analysis SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools
Dr. Hidaia Mahmood Alassoulii
Implementing Multifactor Authentication - Protect your applications from cyberattacks with the help of MFA
Marco Fanti
10 Machine Learning Blueprints You Should Know for Cybersecurity - Protect your systems and boost your defenses with cutting-edge AI techniques
Rajvardhan Oak
Mastering Veeam Backup & Replication - Design and deploy a secure and resilient Veeam 12 platform using best practices
Chris Childerhose
Digital Forensics with Kali Linux - Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022x 3rd Edition
Shiva V. N. Parasram
Zed Attack Proxy Cookbook - Hacking tactics techniques and procedures for testing web applications and APIs
Ryan Soper, Nestor N Torres, Ahmed Almoailu
Microsoft Defender for Endpoint in Depth - Take any organization's endpoint security to the next level
Paul Huijbregts, Joe Anich, Justen Graves
Mastering Linux Security and Hardening - A practical guide to protecting your Linux system from cyber attacks
Donald A. Tevault
Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools
Dr. Hedaya Alasooly
Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools
Dr. Hidaia Mahmood Alassoulii
Cybersecurity Blue Team Strategies - Uncover the secrets of blue teams to combat cyber threats in your organization
Kunal Sehgal, Nikolaos Thymianis
Combating Crime on the Dark Web - Learn how to access the dark web safely and not fall victim to cybercrime
Nearchos Nearchou
We Need To Talk - 52 Weeks To Better Cyber-Security
L. Brent Huston
Mastering Python Networking - Utilize Python packages and frameworks for network automation monitoring cloud and management
Eric Chou
DevSecOps in Practice with VMware Tanzu - Build run and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
Robert Hardt, Parth Pandit
Cloud Auditing Best Practices - Perform Security and IT Audits across AWS Azure and GCP by building effective cloud auditing plans
Shinesa Cambric, Michael Ratemo
Digital Forensics and Incident Response - Incident response tools and techniques for effective cyber threat response
Gerard Johansen
Basic Setup of FortiMail Mail Server
Dr. Hidaia Mahmood Alassoulii
Hybrid Cloud Security Patterns - Leverage modern repeatable architecture patterns to secure your workloads on the cloud
Sreekanth Iyer
Diving into Secure Access Service Edge - A technical leadership guide to achieving success with SASE at market speed
Jeremiah
Network Protocols for Security Professionals - Probe and identify network-based vulnerabilities and safeguard against network protocol breaches
Yoram Orzach, Deepanshu Khanna
Cybersecurity – Attack and Defense Strategies 3rd edition - Improve your security posture to mitigate risks and prevent attackers from infiltrating your system
Yuri Diogenes, Dr. Erdal Ozkaya
Windows and Linux Penetration Testing from Scratch - Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results
Phil Bramwell
Mastering Windows Security and Hardening - Secure and protect your Windows environment from cyber threats using zero-trust security principles
Mark Dunkerley, Matt Tumbarello
Learn Wireshark - A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark
Lisa Bock
Learn Computer Forensics – 2nd edition - Your one-stop guide to searching analyzing acquiring and securing digital evidence
William Oettinger
OPNsense Beginner to Professional - Protect networks and build next-generation firewalls easily with OPNsense
Julio Cesar Bueno de Camargo
Incident Response with Threat Intelligence - Practical insights into developing an incident response capability through intelligence-based threat hunting
Robert Martinez
Mastering Palo Alto Networks - Build configure and deploy network solutions for your infrastructure using features of PAN-OS
Tom Piens aka Piens aka 'reaper'
Microsoft Security Compliance and Identity Fundamentals Exam Ref SC-900 - Familiarize yourself with security identity and compliance in Microsoft 365 and Azure
Dwayne Natwick