<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Volume &#8211; Business Legions Blog</title>
	<atom:link href="https://www.businesslegions.com/blog/tag/volume/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.businesslegions.com/blog</link>
	<description>Deals, entrepreneur, money, business, website, design,technology and random ramblings</description>
	<lastBuildDate>Thu, 21 Jun 2018 13:28:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Cyber Security Volume II: Network Security for $15</title>
		<link>https://www.businesslegions.com/blog/2018/06/21/cyber-security-volume-ii-network-security-for-15/</link>
					<comments>https://www.businesslegions.com/blog/2018/06/21/cyber-security-volume-ii-network-security-for-15/#respond</comments>
		
		<dc:creator><![CDATA[Marco]]></dc:creator>
		<pubDate>Thu, 21 Jun 2018 13:28:19 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[deals]]></category>
		<category><![CDATA[design]]></category>
		<category><![CDATA[entrepreneur]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[Business']]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[II]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Volume]]></category>
		<guid isPermaLink="false">https://www.businesslegions.com/blog/2017/06/30/cyber-security-volume-ii-network-security-for-15/</guid>

					<description><![CDATA[<div class="sale-tagline">
  <strong></strong>
</div>

<div class="expiration">
  Expires May 20, 2022 23:59 PST
</div>


<div class="price">
  Buy now and get <strong>87% off</strong>
</div>


<div class="products-wrapper">
  
    <div class="product-1">
      

      
        <br>
        <div class="screen-1"><img src="https://cdnp2.stackassets.com/daf15f95a452086db478279a7cdcb6cda7451533/store/53d88ae5a5983dd09bcf4f6dd409de3221fa59d84ef236c41f69a6e14e61/product_13299_product_shots1_image.jpg"></div>
      

      <div class="products-description">
        <h3>KEY FEATURES</h3>Over this course you'll learn network hacking techniques and vulnerability scanning to discover security risks across an entire network, learning skills for which companies are willing to pay top dollar. Whether you want to protect your own network or protect corporate networks professionally, this course will get you up to speed.
<br><br>
<ul><li>Access 106 lectures &#038; 12.5 hours of content 24/7
<li>Architect your network for maximum security &#038; prevent local &#038; remote attacks
<li>Understand the various types of firewalls available, including layer 4 firewalls like Iptables &#038; PF
<li>Discuss firewalls on all platforms, including Windows, Mac OS, &#038; Linux
<li>Explore wireless security &#038; learn how WiFi is hacked
<li>Use tools like Wireshark, Tcpdump, &#038; Syslog to monitor your network
<li>Dive into search engine privacy &#038; tracking, learning how to mitigate tracking &#038; privacy issues</ul>
<h3>PRODUCT SPECS</h3><p>Details &#038; Requirements</p>
 
<ul><li>Length of time users can access this course: lifetime</li>
<li>Access options: web streaming, mobile streaming</li>
<li>Certification of completion not included</li>
<li>Redemption deadline: redeem your code within 30 days of purchase</li>
<li>Experience level required: all levels</li></ul>

<p>Compatibility</p><ul><li>Internet required</li></ul>
<h3>THE EXPERT</h3>Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.
<br><br>
His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012. 
<br><br>
Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include:
<br><br>
<ul><li>BSc. (Hons) Computing 'Networks &#038; Communication' 1st Class Honors
<li>SCF : SABSA Charted Architect Foundation
<li>CISSP : Certified Information Systems Security Professional
<li>CISA : Certified Information Systems Auditor
<li>CISM : Certified Information Security Manager
<li>ISO 27001 Certified ISMS Lead Auditor
<li>CEH : Certified Ethical Hacker
<li>OSCP : Offensive Security Certified Professional</ul>

      </div>
    </div>
  
</div>]]></description>
		
					<wfw:commentRss>https://www.businesslegions.com/blog/2018/06/21/cyber-security-volume-ii-network-security-for-15/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber Security Volume I: Hackers Exposed for $15</title>
		<link>https://www.businesslegions.com/blog/2018/06/21/cyber-security-volume-i-hackers-exposed-for-15/</link>
					<comments>https://www.businesslegions.com/blog/2018/06/21/cyber-security-volume-i-hackers-exposed-for-15/#respond</comments>
		
		<dc:creator><![CDATA[Marco]]></dc:creator>
		<pubDate>Thu, 21 Jun 2018 13:28:16 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[deals]]></category>
		<category><![CDATA[design]]></category>
		<category><![CDATA[entrepreneur]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[Business']]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Exposed]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[I]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Volume]]></category>
		<guid isPermaLink="false">https://www.businesslegions.com/blog/2017/06/30/cyber-security-volume-i-hackers-exposed-for-15/</guid>

					<description><![CDATA[<div class="sale-tagline">
  <strong></strong>
</div>

<div class="expiration">
  Expires May 20, 2022 23:59 PST
</div>


<div class="price">
  Buy now and get <strong>87% off</strong>
</div>


<div class="products-wrapper">
  
    <div class="product-1">
      

      
        <br>
        <div class="screen-1"><img src="https://cdnp0.stackassets.com/47b39348125d2736d116d94f8d60578fa333d3aa/store/8a2dba2d6eb9507f4e427134240754e283435a2b423cc02a3932b6cd2a4b/product_13298_product_shots1_image.jpg"></div>
      

      <div class="products-description">
        <h3>KEY FEATURES</h3>Internet security has never been as important as it is today with more information than ever being handled digitally around the globe. In the first course of this four volume bundle, you'll get an introduction to hacking and how to protect yourself and others. You'll develop an understanding of the threat and vulnerability landscape through threat modeling and risk assessments, and build a foundation for which to expand your security knowledge.
<br><br>
<ul><li>Access 117 lectures &#038; 11 hours of content 24/7
<li>Explore the Darknet, malware, exploit kits, phishing, zero day vulnerabilities, &#038; more
<li>Learn about global tracking &#038; hacking infrastructures that nation states run
<li>Understand the foundations of operating system security &#038; privacy functionality
<li>Get a crash course on encryption, how it can be bypassed, &#038; what you can do to mitigate risks
<li>Discover defenses against phishing, SMShing, vishing, identity theft, &#038; other cons</ul>
<h3>PRODUCT SPECS</h3><p>Details &#038; Requirements</p>
 
<ul><li>Length of time users can access this course: lifetime
<li>Access options: web streaming, mobile streaming
<li>Certification of completion not included
<li>Redemption deadline: redeem your code within 30 days of purchase
<li>Experience level required: all levels</ul>

<p>Compatibility</p><ul><li>Internet required</ul>
<h3>THE EXPERT</h3>Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.
<br><br>
His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012. 
<br><br>
Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include:
<br><br>
<ul><li>BSc. (Hons) Computing 'Networks &#038; Communication' 1st Class Honors
<li>SCF : SABSA Charted Architect Foundation
<li>CISSP : Certified Information Systems Security Professional
<li>CISA : Certified Information Systems Auditor
<li>CISM : Certified Information Security Manager
<li>ISO 27001 Certified ISMS Lead Auditor
<li>CEH : Certified Ethical Hacker
<li>OSCP : Offensive Security Certified Professional</ul>

      </div>
    </div>
  
</div>]]></description>
		
					<wfw:commentRss>https://www.businesslegions.com/blog/2018/06/21/cyber-security-volume-i-hackers-exposed-for-15/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber Security Volume I: Hackers Exposed for $15</title>
		<link>https://www.businesslegions.com/blog/2017/12/15/cyber-security-volume-i-hackers-exposed-for-15-3/</link>
		
		<dc:creator><![CDATA[Marco]]></dc:creator>
		<pubDate>Fri, 15 Dec 2017 02:22:05 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[deals]]></category>
		<category><![CDATA[design]]></category>
		<category><![CDATA[entrepreneur]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[Business']]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Exposed]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[I]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Volume]]></category>
		<guid isPermaLink="false">https://www.businesslegions.com/blog/2017/12/15/cyber-security-volume-i-hackers-exposed-for-15-3/</guid>

					<description><![CDATA[<input type="hidden" id="_wpnonce" name="_wpnonce" value="9898c3b83c" /><input type="hidden" name="_wp_http_referer" value="/blog/tag/volume/feed/" />DO YOU LIKE WHAT YOU'VE READ?Join our subscription list and receive our content right in your mailbox. If you like to receive some Great deals our Freebies then subscribe now! Name Email]]></description>
		
		
		
			</item>
		<item>
		<title>Cyber Security Volume II: Network Security for $15</title>
		<link>https://www.businesslegions.com/blog/2017/12/15/cyber-security-volume-ii-network-security-for-15-3/</link>
		
		<dc:creator><![CDATA[Marco]]></dc:creator>
		<pubDate>Fri, 15 Dec 2017 02:22:05 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[deals]]></category>
		<category><![CDATA[design]]></category>
		<category><![CDATA[entrepreneur]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[Business']]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[II]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Volume]]></category>
		<guid isPermaLink="false">https://www.businesslegions.com/blog/2017/12/15/cyber-security-volume-ii-network-security-for-15-3/</guid>

					<description><![CDATA[<input type="hidden" id="_wpnonce" name="_wpnonce" value="9898c3b83c" /><input type="hidden" name="_wp_http_referer" value="/blog/tag/volume/feed/" />DO YOU LIKE WHAT YOU'VE READ?Join our subscription list and receive our content right in your mailbox. If you like to receive some Great deals our Freebies then subscribe now! Name Email]]></description>
		
		
		
			</item>
	</channel>
</rss>
