Coupons tagged with "Network & Security"
Active Coupons
Getting Started with Wireshark: The Ultimate Hands-On Course
Getting Started with Wireshark: The Ultimate Hands-On Course Go from Packet Zero to Packet Hero with this Practical Wireshark course. Created by David Bombal, Chris Greer, Experts with David Bom... more ››
Click to open site
Learning Ethical Hacking From Scratch Training Course
Learning Ethical Hacking From Scratch Training Course Become an ethical hacker that can hack computer systems like black hat hackers and secure them like security experts. Created by Zaid Sabih,... more ››
Click to open site
Comments closed Comments Off
Ethical Hacking and Penetration Testing Bootcamp with Linux
Ethical Hacking and Penetration Testing Bootcamp with Linux Penetration Testing, Pentesting & Ethical Hacking Bootcamp with Metasploit, Kali Linux. Become Ethical Hacker. Get hired Created b... more ››
Click to open site
Comments closed Comments Off
Zabbix 6 Application and Network Monitoring
Zabbix 6 Application and Network Monitoring Learn Server, Proxy, Agents, Trappers, Items, Triggers, Graphs, Screens, LLD, SNMP, API, Grafana, Prometheus & more Created by Sean Bradley | 11 h... more ››
Click to open site
Comments closed Comments Off
OSINT: Open-Source Intelligence
OSINT: Open-Source Intelligence For hackers, investigators, and everyone else Created by Jeff M | 7.5 hours on-demand video course In this course you will be learning about OSINT (Open-source... more ››
Click to open site
Comments closed Comments Off
Check Point Troubleshooting Course [for CCSE & CCTA] -2022
Check Point Troubleshooting Course [for CCSE & CCTA] -2022 CoreXL, SecureXL, ClusterXL - optimization & tuning, debugging | fw monitor / tcpdump / fw ctl zdebug | IPsec VPN Created by Ev... more ››
Click to open site
Comments closed Comments Off
A Complete Cyber Security Guide For Beginners 2022
A Complete Cyber Security Guide For Beginners 2022 Become a Cyber Security Expert, Learn to fight Black Hat Hackers, Protect Yourself, Analyze and Destroy Malwares Created by 7 Defence | 15 hour... more ››
Click to open site
Comments closed Comments Off
Implementing the NIST Cybersecurity Framework
Implementing the NIST Cybersecurity Framework A practitioner's guide to using the NIST Cybersecurity Framework to protect your business or organization Created by Jason Dion, Kip Boyle, Dion Tra... more ››
Click to open site
Comments closed Comments Off
Bug Bounty – An Advanced Guide to Finding Good Bugs Course
Bug Bounty - An Advanced Guide to Finding Good Bugs Course Real World Bug Bounty Techniques Created by Hussein Daher | 10 hours on-demand video course Bug bounties are evolving year after yea... more ››
Click to open site
Comments closed Comments Off
Microsoft 365 Cloud Security Administration – Hands On
Microsoft 365 Cloud Security Administration - Hands On Learn by installing and creating your own Windows 365 Cloud-based Subscription Created by Robert Hill, Paul Hill | 6 hours on-demand video ... more ››
Click to open site
Comments closed Comments Off
Comments closed Comments Off