Toggle navigation
Login
Sign Up
Category:
All
All
Windows Malware (1)
Reverse Engineering (3)
SDN Security (1)
android hacking (2)
API Security (3)
hacking (19)
web application (2)
mobile application (1)
memory forensic (1)
malware hunting (1)
detecting (1)
attacking (1)
vulnerabilities (1)
devops (1)
automate (1)
sql (1)
application security (2)
web API (1)
web hacking (1)
azure (1)
AWS (1)
iOS (1)
fundamental (1)
bootcamp (1)
windows (1)
leadership (1)
HardwareSecurity (1)
#IoTSecurity (2)
ICS (1)
#DevSecOps (1)
IoT (1)
#Telecom Security (1)
Red team (1)
phython (1)
OWASP (1)
Threat hunting (1)
ciso (1)
docker (1)
Author:
All
All
Abhay Bhargav
Abhinav Mishra
Andrea Marcelli
Asmita
Chester Hosmer
Chester Hosmer
Chester Hosmer
Christian Folini
ciso platform
Gordon Rudd
Gregory Pickett
Harshit Agarwal & Himanshu Mehta
Harshit Agrawal
Inon Shkedy
Javier Vazquez Vidal
Jitendra Chauhan, Apoorv Raj Saxena
Jonathan Pollet
Joshua Jebaraj
Marco Ortisi
Nathan Zimmerman
Rewanth Cool and Hrushikesh Kakade
Sachin Deodhar
Find a product
3.Android Application Hacking by Rewanth Cool and Hrushikesh Kakade
Available until
Unlocking Secrets Of Android Application Hacking with industry experts
Rewanth Cool and Hrushikesh Kakade
%
COMPLETE
FREE
2.Reverse Engineering And Signature Generation By Andrea Marcelli
Available until
Learn Reverse Engineering with industry experts
Andrea Marcelli
%
COMPLETE
FREE
4.Hardware Security on Vehicles by Javier Vazquez
Available until
Learn hardware security with industry experts
Javier Vazquez Vidal
%
COMPLETE
FREE
7.Devsecops by Abhay Bhargav
Available until
Learn Devsecops with industry experts
Abhay Bhargav
%
COMPLETE
FREE
8.Hacking IoT with EXPLIoT by Asmita
Available until
Hacking IoT with industry experts
Asmita
%
COMPLETE
FREE
9. Telecom Security by Harshit Agarwal & Himanshu Mehta
Available until
Learn telecom security with industry experts
Harshit Agarwal & Himanshu Mehta
%
COMPLETE
FREE
11. Python OSINT Collection From Geographic Hot Spots – Live While They Happen by Chester Hosmer
Available until
Learning Phython from expert
Chester Hosmer
%
COMPLETE
FREE
10.Continuous Automated Red Teaming CART by Jitendra Chauhan, Apoorv Raj Saxena
Available until
Learn Automated Red Teaming with industry experts
Jitendra Chauhan, Apoorv Raj Saxena
%
COMPLETE
FREE
13. Threat Hunting 360 – Where To Look by Nathan Zimmerman
Available until
Learn Threat Hunting with industry experts
Nathan Zimmerman
%
COMPLETE
12. An Introduction To The OWASP ModSecurity Core Rule Set by Christian Folini
Available until
Learn OWASP with industry experts
Christian Folini
%
COMPLETE
15. Defending Docker Implementations by Joshua Jebaraj
Available until
Learning Docker Implementation from expert
Joshua Jebaraj
%
COMPLETE
1.API Security By Inon Shkedy
Available until
Learn API security with industry experts
Inon Shkedy
%
COMPLETE
FREE
14. Every CISOs First 90 Days On The Job by Gordon Rudd
Available until
Learn CISOs 90 days with industry expert
Gordon Rudd
%
COMPLETE
6.Performing Penetration Testing On Industrial Control Systems and OT Networks by Jonathan Pollet
Available until
Learn penetration testing on ICS with industry experts
Jonathan Pollet
%
COMPLETE
FREE
5.Adventures In SDN Security by Gregory Pickett
Available until
Learning SDN Security with industry experts
Gregory Pickett
%
COMPLETE
FREE