Showing 316–324 of 578 results

  • Security , Shop

    AWS Cloud Security

    AWS has products and services that can pretty much take care of any business computing need you might have, but with each specific project, you absolutely must consider how you will keep it secure. The services and products you will learn in this path are designed to help you do just that.

     

    HOMEPAGE – https://www.pluralsight.com/paths/aws-cloud-security

     

    Our Price: $2
  • Security , Shop

    Pen Testing

    This path will cover the essential tasks of pen testing, walking through each phase as if you are shadowing a live pen test. The scenario will cover a full network pen test, aligning to MITRE ATT&CK tactics and techniques. In addition, there are more specific and targeted types of attacks that a pen tester should know and be aware of, …

  • Programming , Security

    Windows System Programming: Security

    In this course, we will start with fundamentals concepts in windows security, followed by learning how to work with security ids and access tokens. And finally, we will look at how to secure kernel objects.

     

    HOMEPAGE – https://www.pentesteracademy.com/course?id=56

     

    Our Price: $3
  • Security , Shop

    Powershell for Pentesters

    The PowerShell For Penetration Testers (PFPT) is an online course designed for teaching PowerShell to penetration testers, system administrators and other security professionals. You will be able to use and write tools in PowerShell which is installed by default of all modern Windows operating systems. The course will be of interest for anyone who wants to know more about using …

  • Security , Shop

    Breaching the Cloud w/ Beau Bullock

    Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this training course, hacking concepts will be introduced for each of those services.

    This training walks through a complete penetration testing methodology of cloud-based infrastructure. …

  • Security , Shop

    Azure Pentesting

    This on-demand course is intended for IT and security professionals who want to apply the most common attacks and security pitfalls in order to compromise an Azure Tenant. We will discuss different ways of achieving initial access, privilege escalation and persistence in a compromised environment. Furthermore, to evaluate and understand the risks that a legacy on-premise environment brings to a …

  • Security , Shop

    Advanced Web Attacks and Exploitation – WEB-300

    Advanced Web Attacks and Exploitation (WEB-300) is an advanced web application security course. We teach the skills needed to conduct white box web app penetration tests.

    The bulk of your time will be spent analyzing source code, decompiling Java, debugging DLLs, manipulating requests, and more, using tools like Burp Suite, dnSpy, JD-GUI, Visual Studio, and the trusty text editor.

     

    HOMEPAGE – https://www.anonymz.com/?https://www.offensive-security.com/awae-oswe/

     

    Original …

  • Security , Shop

    Active Defense & Cyber Deception w/ John Strand

    Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between.

    In this class, you will learn how to …

  • Security , Shop

    The Metasploit Framework Bootcamp

    The Metasploit Framework is one of the most widely utilized exploitation tools used by penetration testers and security researchers. For anyone looking to get started with a career in cybersecurity and penetration testing, the ability to use the Metasploit framework to conduct penetration tests and security audits is an essential skill to master on your path to becoming a competent …