Humble Tech Book Bundle: The Ethical Hacking & Cyber Defense Bundle by Packt

Loading... ebook

Loading dates...

View on Humble Bundle

Books in this Bundle

Book
Rating
Links
Authors: David J. Gee

Key Features | | | Gain practical perspectives from global CISOs on cyber tra...

★★★★★
5.0 (1)
Authors: Tom Piens aka 'reaper'

Key Features | | | Master Palo Alto Networks firewalls with hands-on labs and...

★★★★½
4.7 (9)
Authors: Paul Huijbregts,Joe Anich,Justen Graves

Key Features | | | Understand the history of MDE, its capabilities, and how y...

★★★★☆
4.4 (8)
Authors: Megan Roddie,Jason Deyalsingh,Gary J. Katz

Key Features | | | Master the core principles of detection engineering, from ...

★★★★☆
4.2 (16)
Authors: Valentine G. Nachi,Donald A. Tevault

Key Features | | | Automate reconnaissance, exploitation, and post-exploitati...

★★★★☆
4.0 (1)
Authors: Aaron Guilmette,James Hardiman,Doug Haven,Dwayne Natwick

Key Features | | | Gain invaluable insights into SC-300 certification content...

★★★★☆
4.0 (1)
Authors: Derek Fisher

Key Features | | | Identify and mitigate security threats across software, cl...

★★★★☆
4.0 (1)
Authors: Corey P. Schultz

Key Features | | | Install and configure Kali Linux on multiple platforms, ch...

★★★½☆
3.8 (44)
Authors: Lester Nichols

Key Features | | | Gain insights into the cybersecurity architect role and ma...

★★★½☆
3.8 (5)
Authors: Hemang Doshi,Javen Khoo Ai Wee

Key Features | | | Learn from a qualified CISA and bestselling instructor, He...

★★★½☆
3.8 (105)
Authors: Zhassulan Zhussupov

| | Warning: | | This course intentionally includes a virus file as part of...

★★★½☆
3.8 (4)
Authors: Miriam C. Wiesner,Tanya Janca

| | Warning: | | This course intentionally includes a virus file as part of...

★★★½☆
3.5 (4)
Authors: Eyal Estrin

Key Features | | | Discover hands-on techniques for implementing robust cloud...

★★★☆☆
3.3 (4)
Authors: Orhan Yildirim

Key Features | | | Build end-to-end agentic AI-driven penetration testing wor...

☆☆☆☆☆
0.0 (0)
Authors: Gourav Nagar,Shreyas Kumar,Rohit Ghai

Key Features | | | Explore each stage of the cyberattack process using the cy...

☆☆☆☆☆
0.0 (0)
Authors: Durgesh Kalya,Marco (Marc) Ayala

Key Features | | | Understand OT incident management with a focus on IACS, th...

☆☆☆☆☆
0.0 (0)
Authors: Bi Yue Xu,Rod Trent

Key Features | | | Explore the Security Copilot ecosystem and learn to design...

☆☆☆☆☆
0.0 (0)
Authors: Bogdan Kireeve,Chas Clawson

Key Features | | | Master essential skills for security monitoring and analyt...

☆☆☆☆☆
0.0 (0)
Authors: Kyler Kent

Key Features | | | Master SIEM and learn to investigate, triage, and move bey...

☆☆☆☆☆
0.0 (0)
Authors: Jose Lazaro,Marcus Burnap,Rod Trent

Key Features | | | Deploy Microsoft Sentinel with end-to-end guidance, includ...

☆☆☆☆☆
0.0 (0)