Showing 334–342 of 578 results

  • Security , Shop

    Advanced Cyber Threat Intelligence

    Do you want to take your cyber threat intelligence skills to the next level so you can better protect your organization? Learn to leverage existing data sources, reduce false positives, and use models like the Cyber Kill Chain, and the MITRE ATT&CK framework to structure your analysis in this Advanced Cyber Threat Intelligence course.

     

    HOMEPAGE – https://www.cybrary.it/course/advanced-cyber-threat-intelligence-2020-07-09

     

    Our Price: $3
  • Security , Shop

    Hands-On Web App Pentesting

    EPISODES

    • WEB BASICS
      • Overview
      • URLs
      • HTTP Methods
      • Web App Infrastructure
      • Web APIs
      • Content Management Systems
      • Databases
    • COMMON TOOLS
      • Web Browser
      • Burp Suite
      • <li role="button" ...
  • Security , Shop

    EC-Council Certified Incident Handler v2 (PDF-VID)

    This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe.

    It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post breach consequences by reducing the impact of the incident, from both a financial and a …

  • Security , Shop

    Adversary Simulation and Red Team Tactics

    This intense course covers the skills required to conduct a simulation of a sophisticated adversary, including the latest tradecraft and offensive tactics. During the training you will gain insight in to planning and conducting a red team operation including all the steps required to perform efficient opensource intelligence, design and automate the deployment of operational infrastructure, gain initial access and …

  • Security , Shop

    Web Hacking Secrets: How To Hack Legally And Earn Thousands Of Dollars At HackerOne

    HackerOne is your big opportunity. This is the platform where you can hack legally and at the same time you can make money. You can hack many different companies like Twitter, Yahoo, Uber, Coinbase, and a lot more. And you can get paid for your findings, for example $100, $1,000, or even $10,000 per one bug. It’s just amazing. All you need is …

  • Security , Shop

    WinDbg Fundamentals: User Mode

    In this course you will learn the fundamentals of using WinDgb for user mode debugging.

     

    HOMEPAGE – https://www.pentesteracademy.com/course?id=52

     

    Our Price: $5
  • Networking , Security

    Security Onion

    Security Onion is an open-source Network Security Monitoring and log management Linux Distribution. In this Security Onion course, you will explore the history, components, and architecture of the distro to improve your networking skills. Learn how to install and deploy server architectures, as well as how to replay or sniff traffic.

     

    HOMEPAGE – https://www.cybrary.it/course/security-onion/

     

    Our Price: $3
  • Security , Shop

    API Platform Part 2: Security

    Yep! You ❤️your new API Platform-powered API! It’s just missing… well… any type of security! This is a big & important topic, so let’s take it head-on in part 2 of our API Platform tutorial:

    • API token security? Or tried-and-true session based login form security?
    • CSRF protection? SameSite Cookies? Ice Cream?
    • Security firewall setup for json_login authentication
    • Authorization & roles: …
  • Security , Shop

    Certified Malicious Software Analyst

    Learn how to analyze malware using tools for Dynamic and Static analysis. Understand how to use IDA Pro Disassembler and Immunity Debugger, how to intercept process injection, how to add network detection with Snort or at binary-level with Yara.

    As a Reverse Engineer you need to know how to dump process from memory and reconstruct them to run them in a …