Prevent web application hacking with this easy to use guide
Your one stop solution to implement a Cyber Defense Intelligence program in to your organis…
Master the art of detecting and averting advanced network security attacks and tec…
Get complete understanding of ethical hacking and become proficient at hacking any…
Follow the best practices to keep the Enterprises safe and secure from cyber attacks
Gain expertise in analyzing your network while tracking various security threats
Ethical hacking techniques for developing more secure applications
Your certification guide to ethical hacking
Protect yourself from hackers and cyber attacks. Master penetration testing + build security and cod…
Hack your way to a secure and threat-free environment using best-in-class tools and techniques.
Basic-to-advanced network analysis using Wireshark! Ethical Hacking via Kali Linux: passwor…
Complete Ethical Hacking Series (CEHv9): Honeypots, IDS and Firewalls
Complete Ethical Hacking Series (CEHv9): Pen Testing the Right Way
Learn OWASP TOP 10 Vulnerability Categories and the Defenses and Fixes for them. Covering all the po…
Learn everything you need to execute web application security assessments as a professional ethical …
Build robust and highly-secured environments with the most advanced tools and techniques
Sharpen your pentesting skill in a bootcamp
A complete pentesting guide facilitating smooth backtracking for working hackers
Your one stop guide in knowing how secure your web apps are
Attacking & securing Windows systems with Metasploit and Kali Linux
Master Wireshark and discover how to analyze network packets and protoc…
Dive into the world of Advanced Network Penetration Testing
Exploit the secrets of Metasploit to master the art of penetration testing.
Discover the secrets of web application pentesting using Burp Suite, the best tool for the …
Learn how to build complex virtual architectures that allow you to perform virtually any required te…
Employ the most advanced pentesting techniques and tools to build highly-secured systems
Build intricate virtual architecture to practice any penetration testing technique virtually
Build your own secure enterprise or home penetration testing lab to dig into the various hacking tec…
A Complete Guide to Hacking WiFi (WEP, WPA, and WPA2) Wireless Security and How to Exploit (Pentest…
Explore every nook and cranny of the Android OS to modify your device and guard it against security …
Android’s popularity makes it a prime target for attacks, which is why this tutorial is so essential…
Dive into the world of advanced network penetration tests to survey and attack wireless networks usi…
A step-by-step guide to backing up and restoring your database using safe, efficient, and p…
Master the Metasploit Framework and become an expert in penetration tes…
Enhance your Penetration Testing skills with Metasploit 5
Learn the basics and the latest features of Metasploit 5
Test and secure your system services. Implement efficient techniques with Metasploit…
Ultimate guide to getting started with the Metasploit Framework. Access…
Put your defenses to the test with the Metasploit framework
Discover the next level of network defense with the Metasploit framewor…
Over 100 recipes for penetration testing using Metasploit and virtual m…
Exploit the secrets of Metasploit to master the art of penetration test…
An easy to digest practical guide to Metasploit covering all aspects of…
Master the art of penetration testing with Metasploit Framework in 7 da…
Take your penetration testing and IT security skills to a whole new level with t…
With this tutorial you can improve your Metasploit skills and learn to …
Enhance your knowledge of penetration testing using Metasploit
Know how hackers behave to stop them! This cookbook provides many recipes for pe…
Develop advanced exploits and modules with a fast-paced, practical learning guid…
The art of ethical hacking made easy with Metasploit
Over 70 recipes to master the most widely used penetration testing framework wit…
Gain practical experience of creating security solutions and designing secure, highly available, and…
Develop blockchain application with step-by-step instructions, working example and helpful recommend…
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber…
Build smart cybersecurity systems with the power of machine learning and deep learning to p…
Get into the world of smart data security using machine learning algorithms and Python libraries
Your one-step guide to understanding industrial cyber security, its control systems, and it…
Understand the nitty-gritty of Cybersecurity with ease
Enhance your organization's secure posture by improving your attack and defense strategies
Learn how to harden every host in the network and how to find a spy in your network.
Stop attacks where they begin!
Learn about the different kinds of cyber attacks and how they can be executed
Get a brief introduction to the Cyber Security Industry and Security+ Certification
Learn how to hack systems like black hat hackers and secure them like security experts
Become an ethical hacker that can hack and secure computer systems
Learn website hacking and penetration testing from scratch
Learn how to hack and protect both WiFi and wired networks like a pro.
Learn advanced techniques to hack into WiFi and wired networks
Learn how to use Android as an ethical hacking tool
CompTIA Security+ Bootcamp: Your preparation course for the most popular cyber security cer…
Pass the CompTIA Cybersecurity Analyst+ (CS0-001) exam on your 1st attempt, includes CySA+ …
Pass the CompTIA Pentest+ (PT0-001) exam on your 1st attempt, includes a Pentest+ practice exam!
Total Seminars and Mike Meyers presents Ethical Hacking prep for the CompTIA Cyber Security…
Master the most up-to-date penetration testing and management skills to determine resiliency against…
Imbibe the most up-to-date penetration testing and management skills to determine resiliency against…
Develop your cybersecurity knowledge to obtain CCNA Cyber Ops certification and ga…
This is a practical certification guide covering all the exam topics in an easy-to-follow manner bac…
Master web application security testing and become a successful bug hunter
Hack Legally and Get Paid For Your Findings
Learn About The Next 5 Bugs That Really Work
Learn About a Vulnerability Detection Technique That is Used by Many Successful Hackers Around the W…
Learn how to detect and exploit security vulnerabilities in AngularJS applications.
Windows & MacOS administration. Manage users, shared resources like drives, printers in a mixed envi…
Windows & Linux administration. Manage users, shared resources like drives, printers in a mixed environment
Design and create neural networks with deep learning and artificial intelligence principles…
Create and unleash the power of neural networks using TensorFlow and deep learning concepts…
Visualize a variety of Neural Network architectures and even show how your pre-trained mode…
A comprehensive guide to programming with network sockets, implementing Internet protocols,…
Discover network vulnerabilities and threats to design effective network security …
Plug the gaps in your network's infrastructure with resilient network security mod…
Delve into network traffic and analyze individual protocol data units
Leverage the power of Python, Ansible and other network automation tools to make your n…
Network Scanning done just right!
Learn how to monitor your large IT environments with this one-stop, comprehensive guide to the zabbix world
Gather detailed statistics and deploy impressive business solutions with Zabbix…
Learn how to gather detailed statistics and data with this one-stop, comprehensi…
Gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new zabbix 3.0
Tune and optimize Zabbix to maximize performance
Over 70 hands-on recipes to get your infrastructure up and running with Zabbix…
Your one-stop solution to efficient network monitoring with Zabbix
Learn how to refine and organize your IT monitoring systems using your existing …
Leverage the advanced features of Zabbix to set up a professional netwo…
Monitor your network hardware, servers, and web performance effectively and effi…
Basic-to-advanced network analysis using Wireshark! Ethical Hacking via…
Grasp the basics of packet capture and analyze common protocols
Overcome real-world network problems and prevent your systems from vicious attac…
Get well-versed with Wireshark features and get certified
Protect your network as you move from the basics of the Wireshark scena…
Use Wireshark 2 to overcome real-world network problems
Over 100 recipes to analyze and troubleshoot network problems using Wireshark…
Secure your network with ease by leveraging this step-by-step tutorial on the po…
Analyze data network like a professional by mastering Wireshark - From …
Leverage the power of Wireshark to troubleshoot your networking issues …
A succinct guide to securely administer your network using Wireshark
Get up and running with Wireshark to analyze network packets and protoc…
This book will be a massive ally in troubleshooting your network using Wireshark…
A quick and easy guide to getting started with network analysis using Wireshark…
Master the terminal-based version of Wireshark for dealing with network…
Explore open-source Linux tools and advanced binary analysis techniques to analyze malware,…
Get hands-on experience on concepts of Bug Bounty Hunting
Implement reverse engineering techniques to analyze software, exploit software targets, and defend a…
Increase your cybersecurity capability by learning to perform dynamic and static malware an…
Explore the basic concepts of malware and get familiar with various types of malware
Understand malware analysis and its practical implementation
Master malware analysis to protect your systems from getting infected
Understand malware behavior and evade it using IDA Pro, OllyDbg, and WINDBG
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-…
Analyze malware using Cuckoo Sandbox
Hands-On Digital Forensics for Real World Application
A practical guide to deploying digital forensic techniques in response to cyber security incidents
Gain basic skills in network forensics and learn how to apply them effectively
Identify and safeguard your network against both internal and external threats, hackers, and malware…
Get started with the art and science of digital forensics with this practical, hands-on gui…
Leverage the power of digital forensics for Windows systems
Maximize the power of Windows Forensics to perform highly effective forensic investigations
Digital investigation and analysis made easy with Kali Linux
Learn the skills you need to take advantage of Kali Linux for digital forensics investigati…
Simplify the art of digital forensics and analysis with Kali Linux
Use common Python libraries and tools to excel in network and host digital forensics
Over 60 recipes to help you learn digital forensics and leverage Python scripts to amplify …
Design, develop, and deploy innovative forensic solutions using Python
Learn the art of designing, developing, and deploying innovative forensic solutions through Python
Master the art of digital forensics and analysis with Python
A comprehensive guide to Android forensics, from setting up the workstation to analyzing
A hands-on guide to Android forensics, from setting up the forensic workstation to analyzin…
Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform…
Investigate, analyze, and report iOS, Android, and Windows devices
A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone …
Dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this actio…
Discover the tools and techniques of mobile forensic investigations and make sure your mobile autops…
Develop the capacity to dig deeper into mobile device data acquisition
Master powerful strategies to acquire and analyze evidence from real-life scenarios
Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber…
Discover end-to-end penetration testing solutions to enhance your ethical hacking skills
Proven approaches to secure your system by performing Ethical Hacking & Penetration Testing…
Secure any Linux server from hackers and protect it against hacking. The practical Linux Ad…
Learn the secrets of ethical hacking, penetration testing, and network discovery using Kali…
Ethical hacking to penetrate your target
Converting Android to a powerful pentesting platform
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentest…
Dot your i’s and cross your t’s with this pentesting course to safeguard your network and w…
This course will help you discover the secrets of Pentesting using Linux
Test your wireless network’s security and master advanced wireless penetration techniques using Kali…
Proven approaches to secure your web environment and perform penetration testing with Kali Linux
Kali Linux Wireless Penetration Testing Beginner's Guide (Third Edition) presents wireless pentest…
Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hack…
When other's tools fail, writing your own makes you a true penetration tester!
Your one-stop guide to using Python, creating your own hacking tools, and making the most o…
Python for Hacking , Learn how to use python for ethical hacking and penetration t…
Perform penetration testing using Python scripts
Leverage the simplicity of Python and available libraries to build web security …
Your one-stop guide to using Python, creating your own hacking tools, and making the most out of res…
Over 50+ hands-on recipes to help you pen test networks using Python, discover vulnerabilit…
Pentest your system like a pro and overcome vulnerabilities by leveraging Python scripts, …
Employ the power of Python to get the best out of pentesting
Master Shellcode to leverage the buffer overflow concept
Harness the power of Perl to perform professional penetration testing
Master Python scripting to build a network and perform security operations
Take your networking skills to the next level by learning network programming conc…
Master network automation, DevOps, and Software-Defined Networking (SDN) with this…
Program networks using Python 3. Learn network programmability with this practical…
Python 3 is one of the most popular programming languages. Companies like Facebook, Microsoft, and A…
Learn how to develop intelligent applications with sequential learning and apply modern methods for …
Implement and manage a compliance framework to protect personal data using GDPR Foundation training
Implement and manage a compliance framework with regard to the protection of personal data.
Learn the steps needed to make your organization GDPR compliant
Train your employees and protect your organization to prevent cyber threats