Developing graphical user interfaces (GUIs) in Python traditionally involves a lot of manual coding. ...
Au catalogue depuis le: 20.05.2021
Disponible
The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsider ...
Au catalogue depuis le: 20.05.2021
Disponible
Despite the arrival of myriad new and modern languages, COBOL still rules many government and legacy ...
Au catalogue depuis le: 20.05.2021
Disponible
Kali Linux is targeted at digital forensics experts and penetration testers. It includes over 400 pe ...
Au catalogue depuis le: 20.05.2021
Disponible
Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targ ...
Au catalogue depuis le: 20.05.2021
Disponible
You've secured your systems, trained your users, and fortified your network. Think you're ready to h ...
Au catalogue depuis le: 20.05.2021
Disponible
Pen testing is a standard technique for on-site systems, but the way testing is carried out in the c ...
Au catalogue depuis le: 20.05.2021
Disponible
More and more companies are migrating their applications and infrastructure to the cloud, shifting o ...
Au catalogue depuis le: 20.05.2021
Disponible
In this course, instructor Malcolm Shore offers you a hands-on introduction to programming in both t ...
Au catalogue depuis le: 20.05.2021
Disponible
The security required for cloud deployments is quite different from the security applied to on-site ...
Au catalogue depuis le: 20.05.2021
Disponible
Ethical hacking involves testing to see if an organization's network is vulnerable to outside threat ...
Au catalogue depuis le: 20.05.2021
Disponible
Protect your network from cyberattacks. In this course, Malcolm Shore shows how to use the latest to ...
Au catalogue depuis le: 20.05.2021
Disponible
Set a rock-solid foundation for your network, users, and data by learning about the basics of cybers ...
Au catalogue depuis le: 20.05.2021
Disponible
Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for sc ...
Au catalogue depuis le: 20.05.2021
Disponible
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, ...
Au catalogue depuis le: 20.05.2021
Disponible
Ethical hacking is one of the most desired stills for any IT security professional. White hat hacker ...
Au catalogue depuis le: 20.05.2021
Disponible
Enumeration is the key to achieving success with penetration testing, and learning how to do it effe ...
Au catalogue depuis le: 20.05.2021
Disponible
Websites and web applications are-by their very nature-accessible remotely, which puts them at high ...
Au catalogue depuis le: 20.05.2021
Disponible
Bolster your penetration testing skillset by learning three advanced techniques: tunneling, pivoting ...
Au catalogue depuis le: 20.05.2021
Disponible
The key to effectively protecting your systems is understanding the attacks you have to defend them ...
Au catalogue depuis le: 20.05.2021
Disponible