INE Cyber Security Pass - Подписка на 1 год [eLearnsecurity.com / ine.com]
INE Cyber Security Pass
INE поглотила eLearnSecurity.
Все курсы по кибербезопасности от теперь доступны по подписке на 1 год на платформе
Тестирование на проникновение, цифровая форензика, охота за угрозами, пентест веб-приложений, обработка и реагирование на инциденты, анализ малвари, защита сетей, реверс-инжиниринг, разработка эксплоитов.
Что входит в подписку на год:
38 курсов (плюс все курсы, которые будут добавляться в течение периода подписки)
90+ часов видео
Список доступных курсов по подписке:
При покупке этой подписки на год в комплекте отгружают пропуск Development Pass и IT Essentials Pass, а это дополнительные курсы по разработке и различным другим сферам IT.
Цена: $ 99 / год + yandex.disk
Продажник:
INE Cyber Security Pass
INE поглотила eLearnSecurity.
Все курсы по кибербезопасности от теперь доступны по подписке на 1 год на платформе
https://ine.com/pages/cybersecurity
Тестирование на проникновение, цифровая форензика, охота за угрозами, пентест веб-приложений, обработка и реагирование на инциденты, анализ малвари, защита сетей, реверс-инжиниринг, разработка эксплоитов.
Что входит в подписку на год:
38 курсов (плюс все курсы, которые будут добавляться в течение периода подписки)
90+ часов видео
Список доступных курсов по подписке:
Professional
Web Defense
Practical Web Defense 37:10:37
Penetration Testing
Penetration Testing: Network Security 15:14:36
Penetration Testing: System Security 3:0:36
iOS & Mobile App Pentesting 4:53:53
Android & Mobile App Pentesting 6:13:32
PowerShell for Pentesters 2:49:1
Penetration Testing: Linux Exploitation 3:11:8
Penetration Testing: Wi-Fi Security 4:4:15
Penetration Testing: Web App Security 5:54:56
Penetration Testing: Metasploit & Ruby 7:1:47
Digital Forensics
Digital Forensics: Logs, Timelines & Reporting 1:40:41
Digital Forensics: System & Network Forensics 5:49:7
Digital Forensics: Introduction & Acquisition 2:23:8
Digital Forensics: File & Disk Analysis 7:9:54
Threat Hunting
Threat Hunting: Hunting the Endpoint & Endpoint Analysis 10:48:51
Threat Hunting: Hunting the Network & Network Analysis 3:30:34
Introduction to Threat Hunting 2:28:52
Web App Penetration Testing
Web Application Penetration Testing 16:18:56
Incident Handling & Response
Incident Handling & Response Overview 1:0:0
Incident Handling & Response: Network Traffic & Flow Analysis 2:20:0
Practical Incident Handling 1:20:0
Incident Handling & Response: SOC 3.0 Operations & Analytics 3:12:28
Malware Analysis
Malware Analysis 13:11:2
None
Network Defense: Network Security 5:14:20
Network Defense: Endpoint Security 8:4:53
Introduction to Network Defense 1:6:37
Reverse Engineering
Practical Reverse Engineering 10:32:7
Reverse Engineering Foundations 1:20:0
Advanced
Penetration Testing
Penetration Testing: Preparing the Attack 1:33:30
Penetration Testing: Red Teaming Active Directory 3:30:28
Penetration Testing: Red Teaming Critical Domain Infrastructure 2:33:42
Penetration Testing: Evasion 0:20:0
Web App Penetration Testing
Web Application Penetration Testing eXtreme 15:2:31
Novice
Exploit Development
Windows Exploit Development 6:48:1
Linux Exploit Development 5:20:0
Penetration Testing
Penetration Testing Basics 16:58:42
Penetration Testing: Preliminary Skills & Programming 11:39:7
Penetration Testing Prerequisites 9:36:6
Web Defense
Practical Web Defense 37:10:37
Penetration Testing
Penetration Testing: Network Security 15:14:36
Penetration Testing: System Security 3:0:36
iOS & Mobile App Pentesting 4:53:53
Android & Mobile App Pentesting 6:13:32
PowerShell for Pentesters 2:49:1
Penetration Testing: Linux Exploitation 3:11:8
Penetration Testing: Wi-Fi Security 4:4:15
Penetration Testing: Web App Security 5:54:56
Penetration Testing: Metasploit & Ruby 7:1:47
Digital Forensics
Digital Forensics: Logs, Timelines & Reporting 1:40:41
Digital Forensics: System & Network Forensics 5:49:7
Digital Forensics: Introduction & Acquisition 2:23:8
Digital Forensics: File & Disk Analysis 7:9:54
Threat Hunting
Threat Hunting: Hunting the Endpoint & Endpoint Analysis 10:48:51
Threat Hunting: Hunting the Network & Network Analysis 3:30:34
Introduction to Threat Hunting 2:28:52
Web App Penetration Testing
Web Application Penetration Testing 16:18:56
Incident Handling & Response
Incident Handling & Response Overview 1:0:0
Incident Handling & Response: Network Traffic & Flow Analysis 2:20:0
Practical Incident Handling 1:20:0
Incident Handling & Response: SOC 3.0 Operations & Analytics 3:12:28
Malware Analysis
Malware Analysis 13:11:2
None
Network Defense: Network Security 5:14:20
Network Defense: Endpoint Security 8:4:53
Introduction to Network Defense 1:6:37
Reverse Engineering
Practical Reverse Engineering 10:32:7
Reverse Engineering Foundations 1:20:0
Advanced
Penetration Testing
Penetration Testing: Preparing the Attack 1:33:30
Penetration Testing: Red Teaming Active Directory 3:30:28
Penetration Testing: Red Teaming Critical Domain Infrastructure 2:33:42
Penetration Testing: Evasion 0:20:0
Web App Penetration Testing
Web Application Penetration Testing eXtreme 15:2:31
Novice
Exploit Development
Windows Exploit Development 6:48:1
Linux Exploit Development 5:20:0
Penetration Testing
Penetration Testing Basics 16:58:42
Penetration Testing: Preliminary Skills & Programming 11:39:7
Penetration Testing Prerequisites 9:36:6
Цена: $ 99 / год + yandex.disk
Продажник: