Filter
Datorsäkerhet
Filter
Master the art of identifying and exploiting vulnerabilities with Metasploit, Empire, PowerShell, and Python, turning Kali Linux into your fighter cockpitKey FeaturesMap your …
Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterpriseKey FeaturesLearn foundational concepts …
Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniquesKey FeaturesUnderstand what happens in an attack and …
Develop the skills required to administer your RHEL environment on-premises and in the cloud while preparing for the RHCSA examPurchase of the print or Kindle book includes a free …
Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation …
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniquesKey FeaturesExplore memory forensics, one of the vital branches of digital …
A proven methodology to build a PolicyOps function and public policy design frameworks for digital adoption, supporting your organization's journey into new paradigms and service …
Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence programKey FeaturesDevelop and implement a threat intelligence program …
Gain practical knowledge of shellcode and leverage it to develop shellcode for Windows and Linux operating systems, while understanding the countermeasures in place and how these …
Get to grips with network-based attacks and learn to defend your organization's network and network devicesKey FeaturesExploit vulnerabilities and use custom modules and scripts to …