Humble Tech Book Bundle: Ultimate Cybersecurity Career by Packt

Loading... ebook

Loading dates...

View on Humble Bundle

Books in this Bundle

Book
Rating
Links
Authors: José Manuel Ortega

| | Warning: | | This course intentionally includes a virus file as part of...

★★★★★
5.0 (1)
Authors: Mark Simos,Nikhil Kumar,Ann Johnson

Key Features | | | Get simple, clear, and practical advice for everyone from ...

★★★★½
4.5 (4)
Authors: Massimo Bertaccini

Key Features | | | Explore the basic principles and history of cryptography |...

★★★★☆
4.2 (2135)
Authors: Denis Isakov

| | Warning: | | This course intentionally includes a virus file as part of...

★★★★☆
4.2 (5)
Authors: Glen D. Singh

Key Features | | | Learn to think like an adversary to strengthen your cyber ...

★★★★☆
4.2 (13)
Authors: Mark Dunkerley

Key Features | | | Gain a deep understanding of the current state of cybersec...

★★★★☆
4.0 (2)
Authors: Mostafa Yahia

Key Features | | | Understand and analyze various modern cyber threats and at...

★★★★☆
4.0 (14)
Authors: Ru Campbell, Viktor Hedberg, Heike Ritter

Key Features | | | Help in understanding Microsoft 365 Defender and how it is...

★★★★☆
4.0 (3)
Authors: Rajneesh Gupta, Santiago Bassett

Key Features | | | Get a thorough overview of Wazuh’s features and learn how ...

★★★★☆
4.0 (1)
Authors: Hemang Doshi, Javen Khoo Ai Wee

Key Features | | | Learn from a qualified CISA and bestselling instructor, He...

★★★½☆
3.8 (105)
Authors: Ed Moyle and Diana Kelley

| Key Features | | | | Leverage practical use cases to successfully archite...

★★★½☆
3.8 (13)
Authors: Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov

Key Features | | | Explore contemporary sophisticated cyber threats, focusing...

★★★½☆
3.8 (4)
Authors: Dale Meredith, Greg Shields

Key Features | | | Familiarize yourself with the best open-source intelligenc...

★★★½☆
3.6 (13)
Authors: David Álvarez Pérez, Ravikant Tiwari

Key Features | | | Make the most of Ghidra on different platforms such as Lin...

★★★½☆
3.5 (10)
Authors: John Sotiropoulos

Key Features | | | Understand the unique security challenges presented by pre...

★★★½☆
3.5 (2)
Authors: Miriam C. Wiesner,Tanya Janca

| | Warning: | | This course intentionally includes a virus file as part of...

★★★½☆
3.5 (4)
Authors: Ken Underhill,Christophe Foulon,Tia Hopkins

Key Features | | | Get well-versed with the interview process for cybersecuri...

★★★☆☆
3.5 (13)
Authors: Dennis Chow, David Bruskin

Key Features | | | Create automated CI/CD pipelines for testing and implement...

★★½☆☆
2.5 (2)
Authors: Adam Book,Stuart Scott

Key Features: | | | Stay updated with the most current SCS-C02 exam syllabus&...

☆☆☆☆☆
0.0 (0)
Authors: Yuri Diogenes

Key Features | | | Master the CNAPP lifecycle from planning to operationaliza...

☆☆☆☆☆
0.0 (0)
Authors: Pierre Thoor, Matthew Zorich

Key Features | | | Optimize configurations for peak security performance by t...

☆☆☆☆☆
0.0 (0)