• Security , Shop

    Windows Kernel Rootkits Training

    To achieve maximum stealth and obtain unabated access to the system, rootkits execute in kernel mode. This course focuses on the kernel interfaces (APIs), data structures and mechanisms that are exploited by rootkits to achieve their goals at every stage of their execution.

    This advanced course provides a comprehensive end-to-end view of the modus-operandi of rootkits by taking an in-depth look …

  • Security , Shop

    Applied Web Application Hacking

    Most organisations utilise web applications. Due to the exposed nature of web applications and complex business logic they contain, they are a valuable target for attackers. Throughout this course focus will be placed on the various vulnerabilities that could affect web applications.

    This course will teach you how to analyse web applications for vulnerabilities and teach you how to exploit them …

  • Networking , Security

    CCNP and CCIE Security Core SCOR 350-701 (Exam Blueprint 1.1)

    The CCNP and CCIE Security Core SCOR 350-701 video course is for anyone interested in learning about key Cisco security as well as anyone studying for the CCNP and CCIE Security exam. Best-selling author and speaker Omar Santos will walk you through the vast array of security topics using dynamic presentations, demos, and test-taking techniques to help you understand security threats, preventative …

  • Linux & IT , Security

    Linux Professional Institute Security Essentials (020-100)

    If you want a career in cybersecurity, you should plan on eventually mastering Linux security. The Linux operating system or permutations of it exist on networks all over the world — sometimes powering entire networks and other times running individual devices. It’s a fundamental skill of a security professional to know the ins and outs of Linux security, and that’s …

  • Security , Shop

    OFFENSIVE MOBILE REVERSING AND EXPLOITATION

    This is a completely hands-on course designed for beginners and intermediate students. Instead of just slides, attendees will get a chance to exploit all of the vulnerabilities taught by the instructors.

     

    HOMEPAGE – https://sectrain.hitb.org/courses/offensive-mobile-reversing-and-exploitation-hitb2023ams/

     

    Original Price: $4,299
    Our Price: $35
  • Security , Shop

    Certified Ethical Hacker Elite

    You will understand how to use open-source intelligence to your advantage. Further, you will discover how to analyze and interpret network protocols and leverage Wireshark. Moving ahead, you will learn how to perform ethical hacking using Nmap. You will also learn how to perform information gathering and enumeration of Windows-specific services with Nmap and OpenVAS. You will then understand how …

  • Security , Shop

    Offensive Development Training Course

    White Knight Labs proudly presents “Offensive Development,” an intermediate-level course meticulously crafted for cybersecurity professionals. This program is not for beginners; it’s tailored for those looking to elevate their skills in the complex art of offensive cybersecurity.

     

    HOMEPAGE – https://training.whiteknightlabs.com/offensive-development-training/

     

    Original Price: $1,100
    Our Price: $20
  • Shop , Security

    Malware On Steroids

    The Malware On Steroids is the first course which is dedicated to building your own C2 Infrastructure and Payload. There are a lot of courses which focus on exploitation, reversing and other offensive stuff, but none of them focus on how you can build your own Command & Control Infra. This course focuses on a brief introduction towards Windows Internals …

  • Shop , Security

    EXPLOIT DEVELOPMENT FOR MIPS

    The course introduces students to exploit development in MIPS processor architecture. Exploit development on MIPS processor hasn’t seen the attention that other architectures such as x86 and ARM got. With the growing IoT devices, we have been seeing many embedded devices with MIPS architecture alongside ARM. Exploit development is getting harder and harder with exploit mitigation techniques in place. But, …