Showing 325–333 of 578 results

  • Security , Shop

    Email and Browser Forensics

    Explore a variety of concepts around email and browser forensics and learn how those concepts are applied in this eleven-video course.

    They say you can tell a lot about someone by the company they keep — or the emails they write. Eleven videos take an in-depth look at the art of email and browser forensics, from the advantages (or disadvantages) of …

  • Security , Shop

    Penetration Testing Student v2 (eJPT)

    The hardest thing you will ever do in cybersecurity is to land your first job. There are HR gateways, industry jargon, and companies unwilling to hire new talent. To help combat these challenges, we have built a hands-on training path focused on the necessary skills to start your career.

    This certification covers Assessment Methodologies and Enterprise Auditing with Host, Network, and …

  • Programming , Security

    C2 Development in C#

    Build your own Command & Control Framework.

    Learn how to design, build and maintain your own C2 Framework codebase from scratch.

    Build a RESTful API-driven Team Server, and a .NET Framework Implant with a variety of post-exploitation capabilities.

    Design and build Unit Tests to automatically test your code and prevent regression bugs.

     

    HOMEPAGE – https://training.zeropointsecurity.co.uk/courses/c2-development-in-csharp

     

    Original Price: $60
    Our Price: $7
  • Security , Shop

    Modern WebApp Pentesting w/ BB King (PDF-VID-LAB)

    Modern Webapp Pentesting is unique in its approach to testing webapps. Too many courses are built around the assumption that a webapp pentester’s skills should grow along a straight line, starting with something like the OWASP Top Ten and culminating in something like Attacking Web Cryptography. Real webapps don’t follow that same path, and neither should real webapp pentesters. Attacking Web …

  • Security , Shop

    Red Team: Getting Access w/ Michael Allen (PDF-VID-LAB)

    Getting a foothold is the first step in a successful breach—be it in the form of user credentials, email access, or code execution on a target system. This course will provide students with the fundamental skills and know-how to perform the most common attacks used to get an initial foothold during a red team exercise.

    Since Microsoft products and services are …

  • Security , Shop

    Network Forensics and Incident Response w/ Troy Wojewoda (PDF-VID-LAB)

    Incident responders are continually faced with the challenge of collecting and analyzing relevant event data—network communications is no exception. This course uses an assortment of network data acquisition tools and techniques with a focus on open-source, vendor-neutral solutions. Students who take this course will learn how to perform network traffic and protocol analysis that ultimately supports cybersecurity incident response efforts. …

  • Security , Shop

    Security Architecture and Engineering Tools

    This path will demonstrate a number of open-source tools that can be utilized for security enterprise environments. Aligning to the objectives of NIST CSF categories and targeting security architects and engineers as our audience, these short-form courses will walk through set up, configuration and validation of the tools in a production enterprise environment.

     

    HOMEPAGE – https://www.pluralsight.com/paths/security-architecture-and-engineering-tools

     

    Our Price: $3
  • Security , Shop

    (ISC)² Certified Cloud Security Professional (CCSP)

    Whether you want to enjoy a career as an enterprise-level architect or security administrator, systems engineer or security manager, the CCSP is sure to provide you with the career leverage you need. Use your in-depth knowledge of Cloud data security, cloud platform and infrastructure security, and cloud application security to transcend the humdrum of your desk job. Move into a …

  • Security , Shop

    CCSP® (Certified Cloud Security Professional)

    This series provides the foundational knowledge needed for the technical skills to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies, and procedures. This series can be used to prepare for the (ISC)²® CCSP® (Certified Cloud Security Professional) examination.

     

    HOMEPAGE – https://www.pluralsight.com/paths/ccspr-certified-cloud-security-professional-exam-date-august-1-2022

     

    Our Price: $2