Developing graphical user interfaces (GUIs) in Python traditionally involves a lot of manual coding. ...
Im Bestand seit: 15.02.2022
Verfügbar
The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsider ...
Im Bestand seit: 15.02.2022
Verfügbar
Despite the arrival of myriad new and modern languages, COBOL still rules many government and legacy ...
Im Bestand seit: 15.02.2022
Verfügbar
Kali Linux is targeted at digital forensics experts and penetration testers. It includes over 400 pe ...
Im Bestand seit: 15.02.2022
Verfügbar
Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targ ...
Im Bestand seit: 15.02.2022
Verfügbar
You've secured your systems, trained your users, and fortified your network. Think you're ready to h ...
Im Bestand seit: 15.02.2022
Verfügbar
Pen testing is a standard technique for on-site systems, but the way testing is carried out in the c ...
Im Bestand seit: 15.02.2022
Verfügbar
More and more companies are migrating their applications and infrastructure to the cloud, shifting o ...
Im Bestand seit: 15.02.2022
Verfügbar
In this course, instructor Malcolm Shore offers you a hands-on introduction to programming in both t ...
Im Bestand seit: 15.02.2022
Verfügbar
The security required for cloud deployments is quite different from the security applied to on-site ...
Im Bestand seit: 15.02.2022
Verfügbar
Ethical hacking involves testing to see if an organization's network is vulnerable to outside threat ...
Im Bestand seit: 15.02.2022
Verfügbar
Protect your network from cyberattacks. In this course, Malcolm Shore shows how to use the latest to ...
Im Bestand seit: 15.02.2022
Verfügbar
Set a rock-solid foundation for your network, users, and data by learning about the basics of cybers ...
Im Bestand seit: 15.02.2022
Verfügbar
Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for sc ...
Im Bestand seit: 15.02.2022
Verfügbar
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, ...
Im Bestand seit: 15.02.2022
Verfügbar
Ethical hacking is one of the most desired stills for any IT security professional. White hat hacker ...
Im Bestand seit: 15.02.2022
Verfügbar
Enumeration is the key to achieving success with penetration testing, and learning how to do it effe ...
Im Bestand seit: 15.02.2022
Verfügbar
Websites and web applications are-by their very nature-accessible remotely, which puts them at high ...
Im Bestand seit: 15.02.2022
Verfügbar
Bolster your penetration testing skillset by learning three advanced techniques: tunneling, pivoting ...
Im Bestand seit: 15.02.2022
Verfügbar
The key to effectively protecting your systems is understanding the attacks you have to defend them ...
Im Bestand seit: 15.02.2022
Verfügbar