v03829 mockupcover

Digital Forensics with Kali Linux

Description Kali Linux is the most comprehensive distributions for penetration testing and ethical hacking. It has some of the most popular forensics tools available to conduct formal forensics and investigations and perform professional-level forensics. This video course teaches you all about the forensic analysis of computers and mobile devices that Read more…

614303 637199631780531752 16x9 1

Securing Android Apps

Securing or “hardening” Android apps is an important final step to ensure code, keys, and credentials, as well as the developer’s intellectual property, are well protected. This course provides an introduction to the key features of the Android security model: from the Android operating system to the hardware it runs Read more…

2824623 18a7 3

Python for Penetration Testers

Description You’re a programmer and you want to get into cybersecurity. You’re in the right place because this course will teach you how to combine or use Python programming to greatly expand your skills as a cybersecurity professional. Penetration testers and cybersecurity analysts often get into the situation of having Read more…

369625 637221418014693480 16x9 2

Cybersecurity with Cloud Computing

Description How do you keep your organization’s files, applications, and accounts safe on the cloud? It starts with a considered design approach. In these videos, Malcolm Shore outlines the major cloud security risks, some of which have resulted in service disruptions at companies like Azure, Dropbox, Google, and Amazon, and Read more…

512726 637199541940241900 16x9 1

Ethical Hacking: Wireless Networks

Description Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks using the latest tools and techniques—the subject of Read more…