Showing 352–360 of 574 results

  • Security , Shop

    The Complete Cybersecurity Bootcamp, 2nd Edition

    The Complete Cybersecurity Bootcamp, 2nd Edition is your comprehensive guide to becoming a cybersecurity professional. The extensive course is compiled from Omar Santo’s best-selling video courses, starting with the basics and leading you through the most important topics in the cybersecurity landscape. The videos in this intensive bootcamp are structured to help you start with the fundamental concepts of cybersecurity and …

  • Security , Shop

    Certified AWS Cloud Red Team Specialist [CARTS]

    AWS Cloud Red Team Course provides in-depth view of AWS core services, Identification of mis-configurations and stealthily abusing them in an Enterprise AWS Cloud Environment. As cloud shift is real, most of the Fortune 500 enterprises relies on AWS Cloud service provider for scaling their business overseas, with expansion comes huge responsibility of identifying and mitigating wide loopholes to secure cloud infrastructure.

     

    HOMEPAGE – …

  • Security , Shop

    IntelTechniques Privacy Course

    The Privacy & Security Crash Course from Intel Techniques is a cyber disappearance training. With OSINT techniques taught in this course you will be able to protect your privacy on the Internet and not allow your information to be published or if this has happened you will learn how to delete this information. And hide your true identity. You will …

  • Security , Shop

    Blockchain security

    This learning path introduces blockchain security, including a description of how the blockchain works at each level of the blockchain ecosystem. Security discussions include everything from the fundamental cryptographic primitives to the nodes and networks that make up the blockchain ecosystem to the security of smart contracts.

     

    HOMEPAGE – https://www.infosecinstitute.com/skills/learning-paths/blockchain-security/

     

    Our Price: $2.50
  • Security , Shop

    Network Hacking Continued – Intermediate to Advanced

    Do you want to take your network hacking skills to the next level? how about building your own network hacking scripts?

    All the attacks in this course are practical attacks that work against real computers, in each technique you will understand the theory behind it and how it works, then you’ll learn how to use that technique in a real life …

  • Security , Shop

    Windows Process Injection for Red-Blue Teams

    In this course, we will understand the basics of Windows processes, virtual memory and different techniques to enumerate processes. Then we will look at the fundamentals of process injection and try out techniques like remote Thread Injection, APC, Thread Hijacking and Process Hollowing.

    This course is very practical with code examples to illustrate each technique!

     

    HOMEPAGE – https://www.anonymz.com/?https://www.pentesteracademy.com/course?id=50

     

    Our Price: $7
  • Security , Shop

    Cryptography: A Hands-on Approach

    Cryptography is a foundation in cybersecurity. It is the underlying building block of many defense mechanisms, systems, and protocols.  Without crypto, we will not be able to safely conduct many things on the Internet, such as web browsing, online banking, working remotely, etc. Without crypto, blockchain and cryptocurrency will not exist.

    In this course, we systematically study the basic principles of …

  • Security , Shop

    Case Studies of Award-Winning XSS Attacks: Part 2

    This course is the follow-up to one of my previous courses – “Case-Studies of Award-Winning XSS Attacks: Part 1”. We will continue our XSS hunting journey and you will learn more about award-winning XSS attacks.

    There are many people hunting for XSSs, but only a few of them are successful and earn a 4-digit ($$$$) reward per single XSS. What makes …

  • Security , Shop

    Certified Incident Handler (ECIH) v2

    This course covers the exam objectives of EC-Council’s Certified Incident Handler v2 (E|CIH) program. It discusses the basic skills to handle and respond to security events and addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The incident handling skills taught in E|CIH are complementary to the job roles below as well …