Security , Shop
AWS Cloud Security
AWS has products and services that can pretty much take care of any business computing need you might have, but with each specific project, you absolutely must consider how you will keep it secure. The services and products you will learn in this path are designed to help you do just that.
HOMEPAGE – https://www.pluralsight.com/paths/aws-cloud-security
Our Price: $2
Security , Shop
Pen Testing
This path will cover the essential tasks of pen testing, walking through each phase as if you are shadowing a live pen test. The scenario will cover a full network pen test, aligning to MITRE ATT&CK tactics and techniques. In addition, there are more specific and targeted types of attacks that a pen tester should know and be aware of, …
Programming , Security
Windows System Programming: Security
In this course, we will start with fundamentals concepts in windows security, followed by learning how to work with security ids and access tokens. And finally, we will look at how to secure kernel objects.
HOMEPAGE – https://www.pentesteracademy.com/course?id=56
Our Price: $3
Security , Shop
Powershell for Pentesters
The PowerShell For Penetration Testers (PFPT) is an online course designed for teaching PowerShell to penetration testers, system administrators and other security professionals. You will be able to use and write tools in PowerShell which is installed by default of all modern Windows operating systems. The course will be of interest for anyone who wants to know more about using …
Security , Shop
Breaching the Cloud w/ Beau Bullock
Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this training course, hacking concepts will be introduced for each of those services.
This training walks through a complete penetration testing methodology of cloud-based infrastructure. …
Security , Shop
Azure Pentesting
This on-demand course is intended for IT and security professionals who want to apply the most common attacks and security pitfalls in order to compromise an Azure Tenant. We will discuss different ways of achieving initial access, privilege escalation and persistence in a compromised environment. Furthermore, to evaluate and understand the risks that a legacy on-premise environment brings to a …
Security , Shop
Advanced Web Attacks and Exploitation – WEB-300
Advanced Web Attacks and Exploitation (WEB-300) is an advanced web application security course. We teach the skills needed to conduct white box web app penetration tests.
The bulk of your time will be spent analyzing source code, decompiling Java, debugging DLLs, manipulating requests, and more, using tools like Burp Suite, dnSpy, JD-GUI, Visual Studio, and the trusty text editor.
HOMEPAGE – https://www.anonymz.com/?https://www.offensive-security.com/awae-oswe/
Original …
Security , Shop
Active Defense & Cyber Deception w/ John Strand
Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between.
In this class, you will learn how to …
Security , Shop
The Metasploit Framework Bootcamp
The Metasploit Framework is one of the most widely utilized exploitation tools used by penetration testers and security researchers. For anyone looking to get started with a career in cybersecurity and penetration testing, the ability to use the Metasploit framework to conduct penetration tests and security audits is an essential skill to master on your path to becoming a competent …
Security
Showing 316–324 of 578 results