The Business of Hacking: Creating, Developing, and Maintaining an Effective Penetration Testing Team 600,000 تومان
Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR 600,000 تومان
Decentralized Identity Explained: Embrace decentralization for a more secure and empowering digital experience 600,000 تومان
Ethical Hacking: Understanding the basics of Hacking Tools and Techniques for Cybersecurity and Safeguarding Information in computer systems and computer networks 600,000 تومان
Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity 600,000 تومان
Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux 600,000 تومان
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity 600,000 تومان
ISC2 Certified Cloud Security Professional (CCSP) Exam Guide : Essential strategies for compliance, governance, and risk management 600,000 تومان
Security for Cloud Native Applications : The practical guide for securing modern applications using AWS, Azure, and GCP 600,000 تومان
PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms 600,000 تومان