• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

  1. tronny

    Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23

    Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23, by Thor Pedersen *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. tronny

    Udemy - Industrial Cybersecurity Controls As per IEC62443

    Udemy - Industrial Cybersecurity Controls As per IEC62443, by Sourabh Suman *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. tronny

    Udemy - Implementing the NIST Cybersecurity Framework, by DionTraining

    Udemy - Implementing the NIST Cybersecurity Framework, by DionTraining *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  4. tronny

    Udemy - Implementing the NIST Cybersecurity Framework (CSF)

    Udemy - Implementing the NIST Cybersecurity Framework (CSF) *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. kawbdfawfhj

    Useful Penetration Testing Tools

    Here are some popular penetration testing tools used in cybersecurity: Nmap (Network Mapper): Nmap is a versatile open-source tool for network discovery and security auditing. It's used to scan and map networks, find open ports, and discover network services running on remote systems...
  6. jain

    Course/Tutorial CISSP – The World's Premier Cybersecurity Certification

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. tronny

    Udemy - Facebook OSINT Hacking, by XEye Cybersecurity

    Udemy - Facebook OSINT Hacking, by XEye Cybersecurity *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. tronny

    Udemy - Demystifying Cybersecurity Fundamentals-Learning with Demos

    Udemy - Demystifying Cybersecurity Fundamentals-Learning with Demos *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. tronny

    Udemy - Cybersecurity Threat Hunting for SOC Analysts

    Udemy - Cybersecurity Threat Hunting for SOC Analysts *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  10. tronny

    Udemy - Cybersecurity Fundamentals - Become a Security Expert

    Udemy - Cybersecurity Fundamentals - Become a Security Expert, by Emilio Aguero *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. tronny

    Udemy - Cybersecurity Foundations From Zero to Pro - Bootcamp

    Udemy - Cybersecurity Foundations From Zero to Pro - Bootcamp, by Hailie Shaw *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. tronny

    Udemy - Cyber Security 2023 Bundle Fundamentals of Cybersecurity

    Udemy - Cyber Security 2023 Bundle Fundamentals of Cybersecurity, by Ciech Defence *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. tronny

    Udemy - Certified in Cybersecurity 2023 - ISC2-CC Complete Training

    Udemy - Certified in Cybersecurity 2023 - ISC2-CC Complete Training *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  14. zilzal

    CYBERSECURITY AND ETHICAL HACKING COURSES 🔥🔥

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  15. tronny

    StationX (Udemy) - Cybersecurity Full Course, by Nathan House

    StationX (Udemy) - Cybersecurity Full Course, by Nathan House *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  16. pullthetrigger

    EBook/Course LINUX ESSENTIALS FOR CUBERSECURITY EPUB BOOK

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. saqib2619

    CyberSecurity Bootcamp: The Ultimate Beginner's Course

    CyberSecurity Bootcamp: The Ultimate Beginner's Course Knowledge that everyone must have. Learn how to protect your personal data from hackers. Take cyber security seriously. https://www.udemy.com/course/personal-digital-security-everyone-must-have-cybersecurity/?couponCode=70F850BD1D30BFBC4808
  18. King Kaka

    Cybersecurity Expert Reveals HACKERS' EASY Sensitive Data Access!

    Simple and effective *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. zieoijod

    HackBot – AI Cybersecurity Chatbot

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  20. carxproveteran

    Employee CyberSecurity Awareness First Line of Defense

    Employee CyberSecurity Awareness First Line of Defense Knowledge that every employee must have. Learn how to protect your company data from hackers and unauthorized access. What you'll learn Understand how to protect the corporate data you have recorded on your computers, laptops and mobile...
  21. tronny

    LiveLessons - The Complete Cybersecurity Bootcamp

    LiveLessons - The Complete Cybersecurity Bootcamp- Threat Defense, Ethical Hacking, and Incident Handling, by Omar Santos *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** LiveLessons - The Complete Cybersecurity Bootcamp, 2nd Edition, by...
  22. sn@ke

    Irresistible: How To Land Your Dream Cybersecurity Position

    Irresistible: How To Land Your Dream Cybersecurity Position https://www.udemy.com/course/irresistible-cybersecurity/ https://rapidgator.net/file/9525993229426c07e331c1270b761351/kctlf.I.H.T.L.Y.D.C.P.part1.rar.html...
  23. tronny

    LiveLessons - The Complete Cybersecurity Bootcamp- Threat Defense

    LiveLessons - The Complete Cybersecurity Bootcamp- Threat Defense, Ethical Hacking, and Incident Handling, by Omar Santos *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  24. carxproveteran

    The Ultimate ISC2 Certified in Cybersecurity (CC) Course '23

    The Ultimate ISC2 Certified in Cybersecurity (CC) Course '23 Launch your Cybersecurity Career with our ISC2 CC Beginner's Course. Pass on Your First Try and Secure the Future Today! What you'll learn The fundamental principles of security, including confidentiality, integrity, and availability...
  25. carxproveteran

    Start Career in CyberSecurity in 2023 - The Ultimate Guide

    Start Career in CyberSecurity in 2023 - The Ultimate Guide From Zero to Hero: Start Your CyberSecurity Career in 2023. Start new life changing and highly paid career now. What you'll learn Understand how to start preparation for a new life changing career as Cyber Security specialist. You will...
  26. tronny

    LiveLessons - Cybersecurity Prevention and Detection (Video Collection)

    LiveLessons - Cybersecurity Prevention and Detection (Video Collection), by Aamir Lakhani *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  27. tronny

    ITProTV - NIST Cybersecurity And Risk Management Frameworks

    ITProTV - NIST Cybersecurity And Risk Management Frameworks *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  28. Promotifex

    Mastering the Art of Ethical Hacking

    Hey fellow hackers, tech enthusiasts, and security aficionados on Crax.pro! 👋 I wanted to start a discussion today that's been on my mind for quite some time now. In recent years, ethical hacking has gained significant attention, not only in the tech world but also in the broader public sphere...
  29. tronny

    Cybrary - Offensive Penetration Testing, by Alejandro Guinea

    Cybrary - Offensive Penetration Testing, by Alejandro Guinea *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  30. tronny

    Coursera - Advanced Python Scripting for Cybersecurity Specialization

    Coursera - Advanced Python Scripting for Cybersecurity Specialization, by Howard Poston *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  31. tronny

    CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification

    CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training, by Bob Salmans *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  32. tronny

    CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification

    CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training, by Bob Salmans *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  33. J

    Others Website that offers free cybersecurity courses

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  34. 6

    Login:Pass Udemy – The Complete Certified in Cybersecurity (CC) course ISC2 ’23

    The Complete Certified in Cybersecurity (CC) course ISC2 ’23 Start your Cyber security career today! Take the Complete Certified in Cybersecurity (CC) beginners course ISC2 – 2023 What you’ll learn Gain the knowledge for entry level IT, Cyber Security, roles and job interviews. Prepare for...
  35. ladenhasan29

    Udemy – The Complete Certified in Cybersecurity (CC) course ISC2 ’23

    The Complete Certified in Cybersecurity (CC) course ISC2 ’23 Start your Cyber security career today! Take the Complete Certified in Cybersecurity (CC) beginners course ISC2 – 2023 What you’ll learn Gain the knowledge for entry level IT, Cyber Security, roles and job interviews. Prepare for...
  36. amine_cold

    Top 16 Cybersecurity Trends to Watch Out for in 2023

    1. Rise of Automotive Hacking Modern vehicles nowadays come packed with automated software creating seamless connectivity for drivers in cruise control, engine timing, door lock, airbags and advanced systems for driver assistance. These vehicles use Bluetooth and WiFi technologies to communicate...
  37. Daxcell

    Cybersecurity Attacks – Red Team Strategies

    https://ufile.io/eq6b15ge
  38. BilalObd

    BEST PAID CYBERSECURITY COUSES COLLECTION FREE FOR EVRYONE

    ✓ Basics https://mega.nz/folder/RvgHWBbD#Qr6CW1O4eezqilYbE9JCPA ✓ Reconnaissance and Footprinting https://mega.nz/folder/R3xmlJoL#sAsqy9CWvJ9JvyB2Hy01sg ✓ Network Scanning https://mega.nz/folder/prgzEQpb#jTyrqM62128YdQWPaMWdYg ✓ Enumeration...
  39. jackbauer

    CompTIA Cybersecurity Analyst CySA+ Labs in Arabic لغة عربي

    What you'll learn Understanding All CompTIA CySA+ Labs Understanding Cybersecurity traffic analysis Learn how to make ethical hacking Learn how to clean Advanced Persistence Threats شرح جميع لابات كورس كومبتيا CySA+ فهم و تحليل للبيانات الخاصة بالامن السيبراني تعلم الاختراق الاخلاقي تعلم ازالة...
  40. yassine_goodman

    Analyzing the Vital Role of Cybersecurity in Today's Digital World

    Exploring the Critical Role of Cybersecurity in the Modern Digital Landscape In our increasingly digital and interconnected world, the importance of cybersecurity cannot be overstated. As technology evolves and permeates every aspect of our lives, the vulnerabilities and threats we face also...
  41. Sonrakii

    Login:Pass What is Cybersecurity ?

    Download *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  42. bilelkort

    Cybersecurity, Data Science, Ethical Hacking eBook Collection

    https://mega.nz/folder/4RFxAIrB#iMQVQlTGBLwt8FJAHy_YVQ
  43. T

    Analyzing the Vital Role of Cybersecurity in Today's Digital World

    Exploring the Critical Role of Cybersecurity in the Modern Digital Landscape In our increasingly digital and interconnected world, the importance of cybersecurity cannot be overstated. As technology evolves and permeates every aspect of our lives, the vulnerabilities and threats we face also...
  44. jadiz

    Introduction to Cybersecurity course

    Discover the world of cybersecurity and its impact, as you uncover the most common threats, attacks and vulnerabilities. in this course By Cisco with a free Badge at the end of the course Available Languages: English, العربية‫, 中文(简体), Nederlands, Français, ქართული, Deutsch, Ελληνικά, עברית...
  45. Razor69

    Cybersecurity skills: CYBRARY (Courses)

    cybersecurity skills Link: https://www.cybrary.it/
  46. Razor69

    Complete course on Ethical Hacking and Cybersecurity (pay)

    Complete course on Ethical Hacking and Cybersecurity (Pay) Link: https://www.udemy.com/course/curso-completo-de-hacking-etico-y-ciberseguridad/
  47. asad786

    🌴Learn to use Kali Linux like a hacker

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. User3Name

    Everything You Need To Know About A DDoS Attack

    DDos A DDoS (Distributed Denial of Service) is a kind of Denial of Service (DoS) attack. As the name implies, a DoS simply tries to prevent a service from working. In a DDoS, the attacker uses a large number of machines from all over the Internet to send enormous amounts of traffic towards the...
  49. br3ke

    STATIONX - The Complete Cyber Security Course! - Volumes 1, 2, 3 & 4

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  50. ZR9

    Station X Cybersecurity Volume 1,2,3,4

    https://mega.nz/folder/j8JzmYjA#sR7N0SOy4fz40NpJ4p9AEw
Top Bottom