Showing 1–9 of 592 results

  • Security , Shop

    Nmap

    In this series we will be covering the use of network mapper utility aptly called Nmap. This series aims to give the viewer a firm grasp of the concepts and applications inherent to Nmap, such as Host Discovery, Port Scanning, Service/OS/Version Detection, and the Nmap Scripting Engine(NSE) for the purposes of security and general network administration.

     

    HOMEPAGE – https://www.acilearning.com/catalog/it/nmap/

     

    Original Price: …

  • Security , Shop

    Web Security, v2

    This workshop is designed to provide frontend web developers and JavaScript engineers with a comprehensive understanding of web security. Covering topics from basic principles to advanced security techniques, participants will learn about common vulnerabilities, prevention strategies, and best practices to secure their web applications.

     

    HOMEPAGE – https://frontendmasters.com/workshops/web-security-v2/

     

    Original Price: $39
    Our Price: $6
  • Security , Shop

    Security Defense and Detection TTX w/ Amanda Berlin & Jeremy Mio

    Security Defense and Detection TTX is a comprehensive four-day tabletop exercise that involves the introduction to completion of security TTXs (tabletop exercises), IR playbooks, and after-action reports. The exercises are paired with video and lab demonstrations that reinforce their purpose. The training as a whole is compatible with the world’s most popular RPG rules.

     

    HOMEPAGE – https://www.antisyphontraining.com/live-courses-catalog/security-defense-and-detection-ttx-w-amanda-berlin-jeremy-mio/

     

    Original Price: $575
    Our Price: …

  • Security , Shop

    DIGITAL FORENSICS AND INCIDENT RESPONSE: TACTICAL EDITION

    Digital forensics and incident response are two of the most critical fields in all of information security. The staggering number of reported breaches in the last several years has shown that the ability to rapidly respond to attacks is a vital capability for all organizations. Unfortunately, the standard IT staff member is simply unable to effectively respond to security incidents. …

  • Security , Shop

    Attack Emulation Tools: Atomic Red Team, CALDERA and More w/ Carrie Roberts

    This class will provide an overview of the MITRE ATT&CK framework and give you in-depth, hands-on knowledge of how to execute scripted attacks that exercise many of the techniques defined in MITRE ATT&CK. You will be provided with hands-on lab instructions for emulating a variety of attacks and creating visualizations using the MITRE ATT&CK Navigator. At the end of this …

  • Security , Shop

    Cisco Certified Support Technician (CCST) Cybersecurity

    This entry-level Cisco Certified Support Technician (CCST) Cybersecurity training prepares entry-level cybersecurity professionals to operate, maintain, troubleshoot, and configure the Cisco devices and software that keep devices and networks secure.

     

    HOMEPAGE – https://www.cbtnuggets.com/it-training/cisco/ccst-cybersecurity

     

    Original Price: $59
    Our Price: $6
  • Security , Shop

    Offensive Tool Development

    The Offensive Tool Development is the first course which is dedicated to Windows API exploitation to build your own tools for Red Team Engagements.

    This course is highly technical in nature, involving a lot of coding and all the tools will be written in either C or C++, sometimes PowerShell (maybe 5%) to make sure the user has capabilitiy to load …

  • Security , Shop

    Threat Reconnaissance Using Remote Scoutware

    Incident response to live cyberattacks requires silent navigation through compromised assets, sometimes in large distributed networks. The popular approach relies on EDR or other live agent-based solutions. However, the activation of security agents and obvious activities on live compromised systems may trigger alerts of advanced threat actors. Once alerted, a cleanup operation and destruction of evidence can happen. Moreover, offline …

  • Security , Shop

    Windows Enterprise Incident Response

    This intensive three-day course is designed to teach the fundamental investigative techniques needed to respond to today’s cyber threats. The fast-paced course is built upon a series of hands-on labs that highlight the phases of a targeted attack, sources of evidence and principles of analysis. Examples of skills taught include how to conduct rapid triage on a system to determine …