freeeducationweb
    • Home
    • Free
      • IT & Software
      • Linux
      • Security
      • Business & Trading
      • Development
      • Graphic & Animations
      • Health & Fitness
      • Teaching
      • Marketing
      • Personal Development
    • Premium
      • Trading, Marketing & Fitness
      • Security
      • Networking
      • Linux & IT
      • Programming
      • Animation & Graphics
    • Request
    • Contact Us

    Security

    Home / Premium / Security / Page 19

    Showing 163–171 of 692 resultsSorted by latest

    • Investigating Windows Memory
      Shop , Programming

      Investigating Windows Memory

      Learn the foundations of how Windows memory is structured, how to acquire memory, how to analyze memory images using Volatility, MemProcFS, and WinDbg, and more!
      HOMEPAGE – https://training.13cubed.com/investigating-windows-memory

       

      Original Price: $795
      Our Price: $25

      $25.00

    • How to scan the entire internet including AWS, Google cloud
      Shop , Security

      How to scan the entire internet including AWS, Google cloud

      Unlock the advanced techniques of network scanning and broaden your penetration testing capabilities with this comprehensive course. Designed for aspiring ethical hackers and security enthusiasts, this course delves deep into the art of efficiently scanning millions of IP addresses and expanding the potential attack surface.

       

      HOMEPAGE – https://www.udemy.com/course/creating-a-shodan-clone-for-hackers-and-bug-bounty-hunters/

       

      Our Price: $3

      $3.00

    • Full Stack Web Attack
      Shop , Security

      Full Stack Web Attack

      Full Stack Web Attack is not an entry-level course. It’s designed to push you beyond what you thought was possible and set you on the path to develop your own workflow for offensive zero-day web research.

      This course is developed for web penetration testers, bug hunters and developers that want to make a switch to server-side web security research or see how serious adversaries …

      $25.00

    • Defending the Enterprise w/ Kent Ickler and Jordan Drysdale
      Shop , Security

      Defending the Enterprise w/ Kent Ickler and Jordan Drysdale

      For the luckiest of enterprises, the awareness of an insecure environment is proven not in public discord after a breach but instead by effective security penetration tests. Time and time again Jordan and Kent have witnessed organizations struggle with network management, Active Directory, organizational change, and an increasingly experienced adversary.

      For new and legacy enterprises alike, Defending the Enterprise explores the …

      $20.00

    • Enterprise Forensics and Response
      Shop , Security

      Enterprise Forensics and Response

      The Enterprise Forensics and Response course is designed to provide students with both an investigative construct and techniques that allow them to scale incident response activities in an enterprise environment. The focus of the lecture portion of the course work is understanding the incident investigation process, objective oriented analysis and response, intrusion analysis and an exploration of attacker Tactics and …

      $20.00

    • Enterprise Attacker Emulation and C2 Implant w/ Joff Thyer
      Shop , Security

      Enterprise Attacker Emulation and C2 Implant w/ Joff Thyer

      As penetration testers, we all have a need to establish command and control channels in our customer environments. This can be done under the guise of an “assumed compromise” context or in a more adversarial Red Team context. The age of endpoint detection and response (EDR) solutions and application whitelisting has created significant barriers to commodity/well known malware deployment for …

      $20.00

    • Certified Red Team – CredOps Infiltrator [CRT-COI]
      Shop , Security

      Certified Red Team – CredOps Infiltrator [CRT-COI]

      • Explore Windows Credential Storage Internals

      • Explore DPAPI, WDigest, LSASS, WiFi, Browser, Registry, Credential Manager

      • Learn to Develop Fully Undetectable Implant

      • Manual Dumping Exercises

       

      HOMEPAGE – https://cyberwarfare.live/product/certified-red-team-credops-infiltrator-crt-coi/

       

      Original Price: $59
      Our Price: $15

      $15.00

    • Building Intrusion Detection Honeypots
      Shop , Security

      Building Intrusion Detection Honeypots

      Intrusion Detection Honeypots rely on deception to trick attackers into interacting with fake systems, services, and data. In this class, you’ll get hands-on experience designing, building, deploying, and monitoring honeypots to detect network adversaries before they accomplish their goals.

       

      HOMEPAGE – https://www.networkdefense.io/library/building-intrusion-detection-honeypots-58155/211924/about/

       

      Original Price: $497
      Our Price: $25

      $25.00

    • Detection Engineering with Sigma
      Shop , Security

      Detection Engineering with Sigma

      Sigma is the open standard language for writing detection queries for logs. In this class, you’ll get hands-on experience writing, modifying, and interpreting Sigma rules based on real-world detection scenarios.

       

      HOMEPAGE – https://www.networkdefense.io/library/detection-engineering-with-sigma-58157/310172/about/

       

      Original Price: $397
      Our Price: $20

      $20.00

    • ←
    • 1
    • 2
    • 3
    • …
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • …
    • 75
    • 76
    • 77
    • →
    • About Us
    • Disclaimer / DMCA
    • Refund Policy
    • TERMS OF USE
    Copyright © [2020-2025] FreeEducationWeb.com