Humble Tech Book Bundle: The Pentesting & Hacking Toolkit by Packt

Loading... ebook

Loading dates...

View on Humble Bundle

Books in this Bundle

Book
Rating
Links
Authors: John Sotiropoulos

Key Features | | | Understand the unique security challenges presented by pre...

★★★★★
5.0 (1)
Authors: Steve Campbell,David Kennedy

Key Features | | | Learn how to apply key attributes of Bash to accomplish co...

★★★★★
5.0 (2)
Authors: Maurício Harley

Key Features | | | Gain detailed insights into vulnerabilities and attack vec...

★★★★★
5.0 (1)
Authors: Dr. Andrew Blyth,Campbell Murray

Key Features | | | Leverage PowerShell's unique capabilities at every stage o...

★★★★★
5.0 (1)
Authors: Oleg Skulkin

| | Warning: | | This course intentionally includes a virus file as part of...

★★★★½
4.5 (17)
Authors: David Okeyode,Karl Fosaaen,Charles Horton

Key Features | | | Understand the different Azure attack techniques and metho...

★★★★½
4.5 (8)
Authors: Kunal Sehgal,Nikolaos Thymianis

Key Features | | | Explore blue team operations and understand how to detect,...

★★★★☆
4.2 (5)
Authors: Denis Isakov

| | Warning: | | This course intentionally includes a virus file as part of...

★★★★☆
4.2 (5)
Authors: Yuri Diogenes,Dr. Erdal Ozkaya

Key Features | | | Updated for ransomware prevention, security posture manage...

★★★★☆
4.1 (68)
Authors: Fahad Ali Sarwar

Key Features | | | Get hands-on with ethical hacking and learn to think like ...

★★★★☆
4.0 (3)
Authors: Dale Meredith,Christopher Rees

Key Features | | | Learn how to look at technology from the standpoint of an ...

★★★★☆
4.0 (1)
Authors: Shane Hartman,Ken Dunham

Key Features | | | Explore essential tools and techniques to ethically penetr...

★★★★☆
4.0 (1)
Authors: Jean-Georges Valle

Key Features | | | Explore various pentesting tools and techniques to secure ...

★★★½☆
3.9 (8)
Authors: Jonathan Helmus

| | Warning: | | This course intentionally includes a virus file as part of...

★★★½☆
3.7 (18)
Authors: Zhassulan Zhussupov

| | Warning: | | This course intentionally includes a virus file as part of...

★★★½☆
3.7 (3)
Authors: Miriam C. Wiesner,Tanya Janca

| | Warning: | | This course intentionally includes a virus file as part of...

★★★½☆
3.5 (4)
Authors: Kim Crawley

Key Features | | | Discover how enterprises use AWS, Azure, and GCP as well a...

★★★☆☆
3.3 (4)
Authors: Shiva V. N. Parasram

Key Features | | | Gain red, blue, and purple team tool insights and understa...

☆☆☆☆☆
0.0 (0)
Authors: Christophe Foulon,Ken Underhill,Tia Hopkins

Key Features | | | Master technical and behavioral interview questions for in...

☆☆☆☆☆
0.0 (0)
Authors: Vijay Kumar Velu

| | Warning: | | This course intentionally includes a virus file as part of...

☆☆☆☆☆
0.0 (0)
Authors: Glen D. Singh

Key Features | | | Execute sophisticated real-world penetration tests, exposi...

☆☆☆☆☆
0.0 (0)
Authors: Phil Bramwell

Key Features | | | Map your client’s attack surface with Kali Linux | | Disc...

☆☆☆☆☆
0.0 (0)