Humble Tech Book Bundle: The Pentesting & Hacking Toolkit by Packt
View on Humble BundleBooks in this Bundle
Key Features | | | Understand the unique security challenges presented by pre...
Key Features | | | Learn how to apply key attributes of Bash to accomplish co...
Key Features | | | Gain detailed insights into vulnerabilities and attack vec...
Key Features | | | Leverage PowerShell's unique capabilities at every stage o...
| | Warning: | | This course intentionally includes a virus file as part of...
Key Features | | | Understand the different Azure attack techniques and metho...
Key Features | | | Explore blue team operations and understand how to detect,...
| | Warning: | | This course intentionally includes a virus file as part of...
Key Features | | | Updated for ransomware prevention, security posture manage...
Key Features | | | Get hands-on with ethical hacking and learn to think like ...
Key Features | | | Learn how to look at technology from the standpoint of an ...
Key Features | | | Explore essential tools and techniques to ethically penetr...
Key Features | | | Explore various pentesting tools and techniques to secure ...
| | Warning: | | This course intentionally includes a virus file as part of...
| | Warning: | | This course intentionally includes a virus file as part of...
| | Warning: | | This course intentionally includes a virus file as part of...
Key Features | | | Discover how enterprises use AWS, Azure, and GCP as well a...
Key Features | | | Gain red, blue, and purple team tool insights and understa...
Key Features | | | Master technical and behavioral interview questions for in...
| | Warning: | | This course intentionally includes a virus file as part of...
Key Features | | | Execute sophisticated real-world penetration tests, exposi...
Key Features | | | Map your client’s attack surface with Kali Linux | | Disc...