• Exclusive

    Hey Guest, unlock an instant 10% bonus discount when you upgrade via the Crypoverse gateway.

  1. protectaccount

    IT & Software ITProTV – Security Tech Skills (2017)

    Commonly used penetration tools4 H 58 M In this course, learn about the common tools used for pen testing. Bonus! Learn how to make your own pen testing tools with Mike and Daniel. In this episode, Daniel and Mike explore common tools, techniques, and practices used in the pursuit of securing...
  2. protectaccount

    IT & Software ITProTV – Linux Security Techniques

    Security features found in modern Linux distributions10 H 47 M This course covers various Linux security techniques like data encryption, firewall configuration, auditing access, pen testing tools, and more. The Linux Security Techniques series introduces the viewers to the various security...
  3. protectaccount

    IT & Software ITProTV – Security Tech Skills

    In this course, learn about the common tools used for pen testing. Bonus! Learn how to make your own pen testing tools with Mike and Daniel. In this episode, Daniel and Mike explore common tools, techniques, and practices used in the pursuit of securing your environment. Here they specifically...
  4. protectaccount

    IT & Software End User Security Awareness | ITProTV

    In this episode, Daniel and Don examine the characteristics that make up a high quality password. They identify weaknesses found in many passwords and demonstrate how attackers can take advantage of weak passwords. They then help the viewers by suggesting a few methods to easily create...
  5. protectaccount

    IT & Software Practical IT Security | ITProTV

    his course is for everyone who wishes to understand the basic and the common cyber security threats that IT pros face daily and how they handle them. Practical IT Security Multi-Factor Authentication Multi-Factor Authentication Part 2 Multi-Factor Authentication Part 3 Multi-Factor...
  6. protectaccount

    IT & Software The Complete Cyber Security Course : End Point Protection! | Udemy

    What you’ll learn An advanced practical skill-set in securing laptops, desktops and mobile devices. Start a career in cyber security. Become a cyber security specialist. The very latest up-to-date information and methods. You will master the selection and implementation of solid disk...
  7. protectaccount

    IT & Software Linux Academy – AWS Certified Security – Specialty 2020

    Learn about security within Amazon Web Services and pass this specialty exam. The top issue in the IT industry right now is finding enough trained talent to run an effective IT team. The second issue is security. Amazon Web Services are addressing both of these needs by launching the AWS...
  8. protectaccount

    IT & Software SCADA Security Analys

    The ICS/SCADA Security Analyst skill path provides you with the knowledge needed to defend the systems that control critical infrastructure. You’ll learn about assessing the security of industrial control and SCADA systems and protecting them from cyber threats. This learning path goes...
  9. protectaccount

    IT & Software Python for Security | ITProTV

    Python is a great language for learning, writing web applications, and manipulating data. However, Python can be used for security testing as well. In this series, we will explore the use of Python in such concepts as brute force password cracking, making SSH connections programmatically...
  10. krillin07

    SOCKS 5 BULLETPROOF SOCKS 5 | MAX SECURITY

    38.7.131.33:999 38.10.69.104:9090 38.25.102.2:999 38.41.0.193:8080 38.45.37.193:999 38.45.42.200:999 38.49.129.154:999 38.49.131.114:999 38.51.48.188:999 38.51.237.4:999 38.52.220.165:999 38.65.172.97:999 38.95.11.1:8080 38.158.92.173:8080 39.108.230.16:3128 40.119.236.22:80 41.33.86.242:8080...
  11. krillin07

    SOCKS 5 BULLETPROOF SOCKS 5 | MAX SECURITY

    71.19.249.97:8443 117.251.103.186:8080 115.239.234.43:7302 47.242.3.214:8081 201.174.175.82:999 35.185.254.159:80 47.100.207.117:8080 221.226.109.229:7302 103.147.182.36:80 104.199.219.13:3128 103.163.51.254:80 139.59.1.14:8080 220.67.2.2:80 122.175.58.131:80 134.209.29.120:3128...
  12. krillin07

    SOCKS 5 BULLETPROOF SOCKS 5 | MAX SECURITY

    163.181.123.54:8080 103.156.141.27:3125 38.145.218.51:8443 8.211.200.183:3128 163.5.128.40:14270 164.70.91.226:3172 47.120.0.231:8081 23.88.88.102:80 91.92.208.172:8080 139.144.224.11:8080 41.65.55.27:1981 209.50.171.40:3129 46.161.196.222:9812 198.12.255.193:3205 103.102.141.40:4145...
  13. protectaccount

    IT & Software CBT Nuggets – Cisco CCNP Security 300-207 SITCS

    Ready to increase your IT security savvy? Keith Barker’s Cisco CCNP Security 300-207 SITCS training course has been released! You’ll learn the ins and outs of various Cisco threat control technologies during the 25-video course. We caught up with Keith to get his thoughts on the training, and...
  14. protectaccount

    IT & Software CBT Nuggets – Cisco CCNP Security 300-206 SENSS

    In this advanced Cisco Security training, Keith Barker prepares learners to take three of the four required exams to earn the CCNP Security certifications: the 300-208 SISAS, 300-206 SENSS, 300-209 SIMOS. In addition to that, this course covers the 300-207 SITCS exam, which – despite being...
  15. protectaccount

    IT & Software Infosecinstitute – Information Security Fundamentals

    12 courses // 54 videos // 8 hours of training Information Security Fundamentals training This learning path builds on your existing IT knowledge and introduces you to fundamental information security concepts and areas. You’ll gain confidence in your cybersecurity skills as you progress...
  16. protectaccount

    IT & Software Infosecinstitute – Cloud Security Architecture

    Cloud Security Architecture training This learning path provides an in-depth look at cloud security architecture. As you progress through 17 courses, you’ll build your knowledge and skills around cloud infrastructure and design, cloud data and application security, network security, secure...
  17. protectaccount

    IT & Software Infosecinstitute – CompTIA Advanced Security Practitioner (CASP+)

    CompTIA Advanced Security Practitioner (CASP+) training This learning path prepares you to pass the CompTIA Advanced Security Practitioner (CASP+) exam. As you progress through 16 courses tied to the five CASP+ domains, you’ll learn advanced practitioner skills, such as analyzing the security...
  18. protectaccount

    IT & Software CBT Nuggets – Cisco CCNP Security 300-209 SIMOS

    Trainer Keith Barker is back with another in-depth course on Cisco security, “Cisco CCNP Security 300-209 SIMOS.” If you’ve been wanting to learn more about implementing Cisco Secure Mobility Solutions and ultimately earn your CCNP Security certification, then this is a great place to start...
  19. protectaccount

    IT & Software Infosecinstitute – Security Engineering

    Security Engineering training This learning path provides a comprehensive, deep-dive into the world of security engineering. Thirty-one courses build your knowledge and skills around everything from securing storage and devices to implementing and maintaining systems to managing risk and...
  20. protectaccount

    IT & Software Infosecinstitute – Security Architecture

    Security Architecture training In the Security Architecture Learning Path, you will learn to solve security problems by understanding the impact on the business and using a risk-driven approach to prioritize and mitigate security risks. This learning path teaches you the necessary skills to...
  21. krillin07

    SOCKS 5 BULLETPROOF SOCKS 5 | MAX SECURITY

    147.161.239.240:8800 185.247.80.10:8090 20.111.54.16:8123 158.160.215.167:8125 198.199.86.11:3128 209.97.150.167:3128 178.156.187.185:10001 159.203.61.169:3128 139.59.1.14:8080 167.103.34.108:8800 35.225.22.61:80 37.187.92.9:1029 20.205.61.143:80 45.167.124.52:8080 38.34.179.97:8448...
  22. krillin07

    SOCKS 5 BULLETPROOF SOCKS 5 | MAX SECURITY

    45.167.91.65:999 45.167.253.129:999 45.169.148.2:999 45.169.148.11:999 45.170.101.2:999 45.170.101.177:999 45.170.102.1:999 45.171.108.253:999 45.171.167.1:999 45.172.111.93:999 45.174.11.2:3021 45.174.77.192:999 45.174.77.243:999 45.174.78.1:999 45.174.78.64:999 45.174.79.101:999...
  23. protectaccount

    IT & Software Cisco CCNP Security | CBT Nuggest

    In this advanced Cisco Security training, Keith Barker prepares learners to take three of the four required exams to earn the CCNP Security certifications: the 300-208 SISAS, 300-206 SENSS, 300-209 SIMOS. In addition to that, this course covers the 300-207 SITCS exam, which — despite being...
  24. protectaccount

    IT & Software Microsoft Azure Security Engineer (AZ-500) | Pluralsight

    Cloud security is becoming ever more important in today’s business world, with Microsoft Azure at the forefront of most companies’ demands. Microsoft Azure Security Engineers must be able to effectively implement security controls and maintain good security posture, as well as manage internal...
  25. SxxNGx

    Other Download TCM Security – Security Operations (SOC) 201 Free

    Security Operations (SOC) 201 is an intermediate security operations course designed to enhance your skills in detecting, investigating, and responding to complex cyber threats at scale. After establishing fundamental security operations knowledge and practical skills in SOC 101, the next...
  26. krillin07

    SOCKS 5 BULLETPROOF SOCKS 5 | MAX SECURITY

    103.82.233.2:53281 103.83.19.126:80 103.83.179.106:8181 103.90.156.248:8080 103.91.82.177:8080 103.93.34.17:8999 103.94.170.202:3888 103.97.46.214:83 103.97.46.214:82 103.97.46.214:84 103.101.82.106:80 103.103.3.6:8080 103.105.55.73:8080 103.105.55.170:8080 103.105.76.7:8080 103.105.76.65:8080...
  27. protectaccount

    IT & Software Infosecinstitute – Enterprise Security Risk Management

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  28. protectaccount

    IT & Software Infosecinstitute – ICSSCADA Security Fundamentals

    ICS/SCADA Security Fundamentals training This learning path introduces the challenges related to securing industrial control systems. You’ll build your ICS/SCADA knowledge by progressing through nine courses. Then test your new skills on the cyber range across 15 hands-on labs. Upon completion...
  29. protectaccount

    IT & Software Information Security Auditing | Infosec

    This learning path builds a foundation of skills around information security auditing. As you progress through 17 courses, you’ll learn how to audit many different aspects of an organization, including business system application and development, disaster recovery and continuity planning...
  30. protectaccount

    IT & Software Certified Computer Security Incident Handler (CSIH) | Infosec

    Certified Computer Security Incident Handler training This learning path goes in-depth into cyber incident response and prepares you to pass the CERT-Certified Computer Security Incident Handler (CSIH) exam. As you progress through 20 courses tied to five the CSIH domains, you’ll learn how to...
  31. protectaccount

    IT & Software NIST 800-53: Introduction to Security and Privacy Controls | Cybrary

    In this course, we will learn how 800-53 fits into the Risk Management Framework (RMF) since the knowledge is fundamental to understanding the importance of the security controls. After studying the steps in RMF, students will discover the history of the 800-53 document based on the revisions to...
  32. protectaccount

    IT & Software PluralSight – Configuring Data Security Policies in Microsoft Azure

    Do you need to enforce proper tagging and region restrictions on your Azure resources? Do you need to make sure customers’ data does not leave their country? Need to comply with EU’s GDPR? In this course, Configuring Data Security Policies in Microsoft Azure, you will gain the ability to easily...
  33. krillin07

    SOCKS 5 BULLETPROOF SOCKS 5 | MAX SECURITY

    190.221.174.130:8080 172.105.107.223:3128 31.220.183.217:53281 45.70.236.194:999 95.31.5.29:54651 13.232.245.132:80 95.216.230.239:80 51.103.137.65:80 49.0.88.27:8080 178.128.157.114:443 14.187.141.43:19132 85.238.74.91:8080 119.237.43.106:80 103.17.213.102:8080 164.52.192.156:80...
  34. protectaccount

    IT & Software The Absolute Tools Guide to Cyber Security and Hacking

    What you’ll learn You will go through a demo on SYN flooding attach using hping3 command You will go through a demo on Metasploit test. Metasploit is a penetration testing framework that makes hacking simple. It’s an essential tool for many attackers and defenders. You will start using...
  35. protectaccount

    Udemy Introduction to Cloud Security with Microsoft Azure

    Increase your cyber security capability by learning the fundamentals of cloud security inside of Microsoft Azure! What you’ll learn Understand the difference between on-premise and hosted solutions Understand the differences between SaaS, PaaS, and IaaS Understand cloud computings...
  36. protectaccount

    IT & Software Certified Cloud Security Professional – CCSP | Infosec4TC

    As powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced professionals equipped with the right cloud security knowledge and skills to...
  37. protectaccount

    IT & Software Breaking Password Security | Infosec

    “Some passwords are just too secure to bother to break.” And some are easy pickings. Ethical hackers in training will appreciate this three-video course on the fundamentals of breaking password security, including multiple approaches to breaking passwords, techniques such as brute-forcing...
  38. protectaccount

    IT & Software Linkedin Learning – CompTIA Security Plus SY0-601 Cert Prep 4 Identity and Access Management Design and Implementation

    At a basic level, organizations must be able to grant access to legitimate users and block requests from those who lack the right permissions in order to operate safely and securely. As a security professional Link: *** Hidden text: You do not have sufficient rights to view the hidden text...
  39. protectaccount

    IT & Software CompTIA Security+ (SY0-601) Cert Prep: 4 Identity and Access Management Design and Implementation | LinkedIn

    At a basic level, organizations must be able to grant access to legitimate users—and block requests from those who lack the right permissions—in order to operate safely and securely. As a security professional, you’re charged with creating and implementing the identity and access management...
  40. protectaccount

    IT & Software Cyber Security – Go From Zero to Hero (2020) | Udemy

    What you’ll learn Become Expert in Computer Networking Fundamentals of Cybersecurity that will help students to dive in this field and Different Types of Attacks and world famous cyber attack examples Entire networking related to Cyber security and Terminologies – Threat, Vulnerability...
  41. protectaccount

    IT & Software Cybrary – Certified Information Systems Security Professional (CISSP)

    CISSP certification verifies one has mastery of a multitude of information assurance and cyber security topics, something that’s necessary for IT management and leadership (a job that many CISSP holders fulfill). Our online CISSP training covers topics ranging from operations security...
  42. protectaccount

    IT & Software CompTIA Security+ (SY0-601) Cert Prep: 3 Cryptography Design and Implementation | LinkedIn

    Prepare for the CompTIA Security+ exam, the leading certification for a career in information security. The latest version, SY0-601, expands coverage of cybersecurity threats, risk management, and IoT threats. This course prepares exam candidates for the third domain of the exam, Cryptography...
  43. protectaccount

    IT & Software Cloud Security : Concepts, Methodologies, Tools, and Applications

    Cloud computing has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern, and developing effective methods to protect sensitive information and data...
  44. protectaccount

    IT & Software ReactSecurity – Advanced React Security Patterns

    Learn how to protect your React apps for the real world. I spent years working in React code bases, where security is the main concern. I also spent almost three years working at Auth0, where I learned a lot about authentication and security. I would like to teach you everything that I know...
  45. protectaccount

    IT & Software Lynda – Programming Foundations – Web Security

    Learn about the most important security concerns when developing websites, and what you can do to keep your servers, software, and data safe from harm. Instructor Kevin Skoglund explains what motivates hackers and their most common methods of attacks, and then details the techniques and mindset...
  46. EarlHickey

    Automated security testing for AI models

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  47. EarlHickey

    Pentesting modules for web, API, and mobile security

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. krillin07

    SOCKS 5 BULLETPROOF SOCKS 5 | MAX SECURITY

    202.93.247.51:8090 62.112.11.202:13037 8.221.139.222:3128 47.99.112.148:9098 196.202.210.35:32650 8.220.204.92:4145 190.61.88.147:8080 172.105.107.223:3128 216.26.236.103:3129 95.173.218.67:8081 195.138.72.170:8080 77.89.35.50:8080 181.188.206.32:999 72.195.34.42:4145 185.18.250.83:80...
  49. protectaccount

    IT & Software TCM Security - Windows Privilege Escalation for Beginners

    Course Overview This course focuses on Windows Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in Gaining a better understanding of privilege escalation techniques Improving Capture...
  50. protectaccount

    IT & Software TCM Security Courses | Mega Pack

    TCM Security - Practical Ethical Hacking - The Complete Course TCM Security - Python 101 For Hackers TCM Security - Python 201 For Hackers TCM Security - Windows Privilege Escalation for Beginners TCM Security - Linux Privilege Escalation for Beginners TCM Security - Movement, Pivoting and...
Top Bottom