Developing graphical user interfaces (GUIs) in Python traditionally involves a lot of manual coding. ...
Im Bestand seit: 20.05.2021
Verfügbar
The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsider ...
Im Bestand seit: 20.05.2021
Verfügbar
Despite the arrival of myriad new and modern languages, COBOL still rules many government and legacy ...
Im Bestand seit: 20.05.2021
Verfügbar
Kali Linux is targeted at digital forensics experts and penetration testers. It includes over 400 pe ...
Im Bestand seit: 20.05.2021
Verfügbar
Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targ ...
Im Bestand seit: 20.05.2021
Verfügbar
You've secured your systems, trained your users, and fortified your network. Think you're ready to h ...
Im Bestand seit: 20.05.2021
Verfügbar
Pen testing is a standard technique for on-site systems, but the way testing is carried out in the c ...
Im Bestand seit: 20.05.2021
Verfügbar
More and more companies are migrating their applications and infrastructure to the cloud, shifting o ...
Im Bestand seit: 20.05.2021
Verfügbar
In this course, instructor Malcolm Shore offers you a hands-on introduction to programming in both t ...
Mevcuda giriş tarihi 20.05.2021
Verfügbar
The security required for cloud deployments is quite different from the security applied to on-site ...
Mevcuda giriş tarihi 20.05.2021
Verfügbar
Ethical hacking involves testing to see if an organization's network is vulnerable to outside threat ...
Mevcuda giriş tarihi 20.05.2021
Verfügbar
Protect your network from cyberattacks. In this course, Malcolm Shore shows how to use the latest to ...
Mevcuda giriş tarihi 20.05.2021
Verfügbar
Set a rock-solid foundation for your network, users, and data by learning about the basics of cybers ...
Mevcuda giriş tarihi 20.05.2021
Verfügbar
Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for sc ...
Mevcuda giriş tarihi 20.05.2021
Verfügbar
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, ...
Mevcuda giriş tarihi 20.05.2021
Verfügbar
Ethical hacking is one of the most desired stills for any IT security professional. White hat hacker ...
Mevcuda giriş tarihi 20.05.2021
Verfügbar
Enumeration is the key to achieving success with penetration testing, and learning how to do it effe ...
Mevcuda giriş tarihi 20.05.2021
Verfügbar
Websites and web applications are-by their very nature-accessible remotely, which puts them at high ...
Mevcuda giriş tarihi 20.05.2021
Verfügbar
Bolster your penetration testing skillset by learning three advanced techniques: tunneling, pivoting ...
Mevcuda giriş tarihi 20.05.2021
Verfügbar
The key to effectively protecting your systems is understanding the attacks you have to defend them ...
Mevcuda giriş tarihi 20.05.2021
Verfügbar