Are you ready to delve into the world of advanced Windows malware development? In this comprehensive course, we will take you on a journey through the intricate art of crafting malware for Windows systems. Whether you’re an aspiring red teamer, a seasoned malware developer, or simply curious about the dark side of cybersecurity, this course is designed to equip you …
Unlock the secrets of Windows forensic investigation with my new course!
Whether you’re looking to get into the field, already work in the field but want to step up your game, or just have an interest in digital forensics, look no further. This course is for you!
Original Price: $695
Our Price: $25
- Learn the foundations of how Windows memory is structured, how to acquire memory, how to analyze memory images using Volatility, MemProcFS, and WinDbg, and more!
Original Price: $795
Our Price: $25
Full Stack Web Attack is not an entry-level course. It’s designed to push you beyond what you thought was possible and set you on the path to develop your own workflow for offensive zero-day web research.
This course is developed for web penetration testers, bug hunters and developers that want to make a switch to server-side web security research or see how serious adversaries …
For the luckiest of enterprises, the awareness of an insecure environment is proven not in public discord after a breach but instead by effective security penetration tests. Time and time again Jordan and Kent have witnessed organizations struggle with network management, Active Directory, organizational change, and an increasingly experienced adversary.
For new and legacy enterprises alike, Defending the Enterprise explores the …
The Enterprise Forensics and Response course is designed to provide students with both an investigative construct and techniques that allow them to scale incident response activities in an enterprise environment. The focus of the lecture portion of the course work is understanding the incident investigation process, objective oriented analysis and response, intrusion analysis and an exploration of attacker Tactics and …
As penetration testers, we all have a need to establish command and control channels in our customer environments. This can be done under the guise of an “assumed compromise” context or in a more adversarial Red Team context. The age of endpoint detection and response (EDR) solutions and application whitelisting has created significant barriers to commodity/well known malware deployment for …
Explore Windows Credential Storage Internals
Explore DPAPI, WDigest, LSASS, WiFi, Browser, Registry, Credential Manager
Learn to Develop Fully Undetectable Implant
Manual Dumping Exercises
Original Price: $59
Our Price: $15
Intrusion Detection Honeypots rely on deception to trick attackers into interacting with fake systems, services, and data. In this class, you’ll get hands-on experience designing, building, deploying, and monitoring honeypots to detect network adversaries before they accomplish their goals.
HOMEPAGE – https://www.networkdefense.io/library/building-intrusion-detection-honeypots-58155/211924/about/
Original Price: $497
Our Price: $25
Showing 1–9 of 549 results