Developing graphical user interfaces (GUIs) in Python traditionally involves a lot of manual coding. ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsider ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
Despite the arrival of myriad new and modern languages, COBOL still rules many government and legacy ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
Kali Linux is targeted at digital forensics experts and penetration testers. It includes over 400 pe ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targ ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
You've secured your systems, trained your users, and fortified your network. Think you're ready to h ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
Pen testing is a standard technique for on-site systems, but the way testing is carried out in the c ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
More and more companies are migrating their applications and infrastructure to the cloud, shifting o ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
In this course, instructor Malcolm Shore offers you a hands-on introduction to programming in both t ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
The security required for cloud deployments is quite different from the security applied to on-site ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
Ethical hacking involves testing to see if an organization's network is vulnerable to outside threat ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
Protect your network from cyberattacks. In this course, Malcolm Shore shows how to use the latest to ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
Set a rock-solid foundation for your network, users, and data by learning about the basics of cybers ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for sc ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
Ethical hacking is one of the most desired stills for any IT security professional. White hat hacker ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
Enumeration is the key to achieving success with penetration testing, and learning how to do it effe ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
Websites and web applications are-by their very nature-accessible remotely, which puts them at high ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
Bolster your penetration testing skillset by learning three advanced techniques: tunneling, pivoting ...
Mevcuda giriş tarihi 20.05.2021
Mevcut
The key to effectively protecting your systems is understanding the attacks you have to defend them ...
Mevcuda giriş tarihi 20.05.2021
Mevcut