Old Search System: secure




  • Ethical Hacking Master\'s Course: HACK & SECURE LIKE A PRO (Updated)

    Ethical Hacking Master's Course: HACK & SECURE LIKE A PRO (Updated) https://www.udemy.com/course/ethical-hacking-ceh-masters-course/ Learn CEH, ethical...


    This Course is a Live Ethical Hacking course. Every weekend you will see new contents added. We will add whole course in coming 45 days. Therefore Questions/Answers can be also be discussed during this course. Get trained in Cyber security and Ethical Hacking with 100% practical demonstration from an Expert...


  • DevSecOps with Azure DevOps: Secure CI/CD with Azure DevOps

    DevSecOps with Azure DevOps: Secure CI/CD with Azure DevOps https://www.udemy.com/course/devsecops-with-azure-devops This course helps to implement...


    What you'll learn: Learn DevSecOps implementation with Azure DevOps Learn SAST Integration with Azure DevOps Learn DAST Integration with Azure DevOps Learn to report security issues in JIRA Learn to implement SonarQube/SonarCloud in DevSecOps Pipeline Learn to implement OWASP ZAP in DevSecOps Pipeline Requirements: Basic computer knowledge Good to have...


  • Secure and Hardening Linux Server like Enterprise server

    Secure and Hardening Linux Server like Enterprise server https://www.udemy.com/course/secure-and-hardening-linux Apply security and Hardening and secure...


    What you'll learn: Learn how to secure your server with best practice Learn how Provisioning and building a Operation System Learn how to hardening your server Learn how to setup a log files and tracking any action used by system administration Learn how to disable unwanted modules on your server...


  • Ethical Hacking Master\'s Course: Hack & Secure Like A Pro

    Ethical Hacking Master's Course: Hack & Secure Like A Pro https://www.udemy.com/course/ethical-hacking-ceh-masters-course/ Learn CEH, ethical hacking,...


    Welcome this comprehensive Ethical Hacking course! This course assumes you have NO prior knowledge and by the end of it you\'ll be able to hack systems like black-hat hackers and secure them like security experts! This course is made in this way that a student will learn the CEH full...


  • Secure Shell (SSH)

    Secure Shell (SSH) https://www.udemy.com/course/secure-shell-ssh SSH made easy


    What you'll learn: Gain in-depth knowledge to become a SSH power user Transferring files & directories using SSH How to use Secure Shell (SSH) Control computers remotely Requirements: Computer (Linux/Windows/Mac) Description: secure shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best-known...


  • Cyber Security: Secure Passwords on Linux

    Cyber Security: Secure Passwords on Linux https://www.udemy.com/course/cyber-security-secure-passwords-on-linux Learn GPG, Pass & Security Keys


    What you'll learn: Best practices for Securing Passwords Understand how a Hacker gets access to Passwords Basics of GPG, Pass and Keepass How to setup Yubikey to work with Pass How to setup Trezor to work with Pass How to sign files with a Security Key Requirements: Basic knowledge of...


  • Cloud Native Security Cookbook: Recipes for a Secure Cloud

    Cloud Native Security Cookbook: Recipes for a Secure Cloud English | May 31st, 2022 |...






  • Cyber Security Awareness: Secure Data & Combat Cyber Threats

    Cyber Security Awareness: Secure Data & Combat Cyber Threats https://www.udemy.com/course/cyber-security-training Learn: Threats, Attacks, Viruses, Security...


    What you'll learn: Explain the differences between Threat, Vulnerability, and Risk Explore the needed skills set and job profiles in the field of Cybersecurity Discuss the evolution of threats and the types of security goals Define what cybersecurity is Learn the Importance of Cybersecurity Differentiate Networking Devices such as Router...


  • Melodic Kings Secure The Bag 2 WAV

    Melodic Kings Secure The Bag 2 WAVFANTASTiC | 13 March 2022 | 40 MB'Secure The...


    home page:
    DOWNLOAD HERE


  • CompTIA Security+ (SY0-601) Cert Prep: 2 Secure Code Design and Implementation

    CompTIA Security+ (SY0-601) Cert Prep: 2 Secure Code Design and Implementation https://www.linkedin.com/learning/comptia-security-plus-sy0-601-cert-prep-2-secure-code-design-and-implementation Application vulnerabilities can...


    In this course, the second installment in the CompTIA Security+ (SY0-601) Cert Prep series, dive into the topic of secure coding design and implementation as you prepare for the Security+ exam. Instructor Mike Chapple goes over the software development lifecycle, covering different software development methodologies, change management processes, and the...


  • Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

    Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure English...


    Key Features Get hold of the best defensive security strategies and tools Develop a defensive security strategy at an enterprise level Get hands-on with advanced cybersecurity threat detection, including XSS, SQL injections, brute forcing web applications, and more Book Description Every organization has its own data and digital assets that...


  • Secure Eraser Professional 5.313 Multilingual

    Secure Eraser Professional 5.313 Multilingual | 9.6 Mb Erase Your Documents and Drives Securely. Because...


    Delete your files and drives securely and clean your system now!
    Secure Eraser uses the most renowned method of data disposal and overwrites sensitive information in such a sure way that it can never be retrieved - even with specialized software. Our multiple award-winning solutions for definitively destroying data also eliminate...


  • Getting Started with Secure Embedded Systems: Developing IoT Systems for micro:bit and Raspberry Pi Pico Using Rust and Tock

    Getting Started with Secure Embedded Systems: Developing IoT Systems for micro:bit and Raspberry Pi Pico...


    Build secure and reliable IoT applications for micro:bit and Raspberry Pi Pico by using Rust and Tock.
    One of the first Operating Systems written in Rust, Tock is designed to safely run multiple applications on low power devices, enabling you to build a secure...


  • Videohive - Shiba Inu Cryptocurrency Coin Rotating From Top Bottom. Decentralized Secure Cryptocurrency Meme - 35329525

    https://s3.envato.com/files/20e58c1e-2ffc-47c1-a24b-a2a4398367fa/video_preview_h264.mp4 Videohive - Shiba Inu Cryptocurrency Coin Rotating From Top Bottom. Decentralized Secure Cryptocurrency Meme...





  • Videohive - Dot Polkadot Coin Appearing. Secure And Forkless Proof. Web 3.0. Polkadot Crypo Animation - 35329517

    https://s3.envato.com/files/fe4c403d-1f2e-42a2-aca2-7595be54fe0a/video_preview_h264.mp4 Videohive - Dot Polkadot Coin Appearing. Secure And Forkless Proof. Web 3.0. Polkadot Crypo...





  • Videohive Secure payment - Scene Situations 34664871

    Videohive Secure payment - Scene Situations 34664871 After Effects Version : CC | Files Included...





  • Videohive - Skyscrapers Digital City Tech Word Secure - 34612577

    https://s3.envato.com/files/ee20e1cf-9826-4f6f-b9d0-600d2044caab/video_preview_h264.mp4 Videohive - Skyscrapers Digital City Tech Word Secure - 34612577 https://videohive.net/item/skyscrapers-digital-city-tech-word-secure/34612577





  • CodeCanyon - Secure VPN Ultimate v1.0 - Flutter Project | Android | IOS | Admin Panel - 31301426

    CodeCanyon - Secure VPN Ultimate v1.0 - Flutter Project | Android | IOS | Admin...






  • CodeCanyon - PayMoney v3.1 - Secure Online Payment Gateway - 22341650 - NULLED

    CodeCanyon - PayMoney v3.1 - Secure Online Payment Gateway - 22341650 - NULLEDDEMO·It is very...






  • Secure It - Data Security Mobile App

    Secure It - Data Security Mobile AppAI, FIG, PSD, XD | 3.8 MB





Showing 100-120