Shop , Security
Practical Pentesting: featuring Brad Stine
Need to create a pen test final report? In this course, learn how to properly pre-plan and execute a successful pen test following the client’s scope of work.
HOMEPAGE – https://www.itpro.tv/courses/security-skills/practical-pentesting-featuring-brad-stine/
Our Price: $5
Shop , Security
The Bug Hunter’s Methodology Live Course
I am thrilled to introduce you to The Bug Hunter’s Methodology LIVE, my masterclass designed for aspiring and seasoned offensive security professionals, including web application security testers, red teamers, and bug bounty hunters.
The Bug Hunter’s Methodology (TBHM) is a two-day, paid, virtual training that aims to equip you with the latest tools, techniques, and strategies, plus provide …
Programming , Security
Python for Cybersecurity Specialization
Master Python for a variety of cybersecurity tasks. This Specialization provides an application-driven introduction to using Python for cybersecurity.
Python is one of the most popular and widely-used programming languages in the world due to its high usability and large collection of libraries. This learning path provides an application-driven introduction to using Python for cybersecurity. Python can …
Shop , Security
Privilege Escalation for OSCP and Beyond – Bundle!
This course teaches privilege escalation in Linux, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (170+), and an intentionally misconfigured Debian VM which can be used by students to practice their own privilege escalation.
This course teaches privilege escalation in Windows, from basics …
Shop , Security
Web Application Penetration Testing Professional (eWPTv2)
Interested in learning how to assess and mitigate real-world web application vulnerabilities an organization could potentially be exposed to? The Web Application Penetration Testing Learning Path is a comprehensive and structured journey designed to equip aspiring penetration testers, Web App Security Professionals, Bug Bounty Hunters, and web developers with the essential skills and knowledge required to plan and perform a …
Shop , Security
Windows Internals Red Team Operator [CWI-RTO]
- Start your journey in Microsoft Windows Internals
- Unveil common Win32/NT APIs used by the malwares
- Understand malwares abusing internals from user-mode perspective
- Perform various challenges/exercises to learn Windows Internals
- Learn different kernel data structures (EPROCES, ETHREAD, KPCR etc.) through Windbg
HOMEPAGE – https://cyberwarfare.live/product/windows-internals-red-team-operator-cwi-rto/
Original Price: $299
Our Price: $25
Shop , Security
Website Hacking Techniques
Learn Web Application Input Validation and Error Handling Testing to be a Master in Industry Based Web PenTesting
Familiarize yourself with major web application attacks such as SQL injection, Cross-Site Scripting, Brute Force, Malicious File Upload, and Encryption attacks on websites. The inclusion of industry-based practicals to learn about web PenTesting can help professionals and beginners alike web PenTesting.
HOMEPAGE – <a ...
Security , Shop
Software Ethical Hacking – How to Crack Software Legally
If you want to learn how to crack software legally, the fun and easy way like playing a computer game, then this course is for you.
What you’ll learn
How to crack software serial number keys
Remove Nag Screen Reminders asking you to register
Convert Trial Software to Fully Functional Software
Extend 30-day Trial Period Software
Learn Reverse Engineering and Assembly Language
Protect your software by learning how …Shop , Security
Beginner’s Guide to IoT and Hardware Hacking
The Beginner’s Guide to IoT and Hardware Hacking course teaches foundational skills and techniques required to get started performing security research and testing on IoT devices and hardware. This course focuses mainly on the hardware aspects of IoT hacking and how to use the underlying access to physical hardware to aid in and amplify the ability to hunt for vulnerabilities. While …
Security
Showing 28–36 of 508 results