Security , Shop
Exploiting Simple Buffer Overflows on Win32
In this course, we will look at how to exploit Simple Buffer Overflows on Win32 systems. This is an introductory course and starts from the very basics of exploitation and is beginner friendly. We will be taking over 10+ real world and staged application examples to illustrate the concepts. It is important to note that this introductory course will be …
Programming , Security
Javascript for Pentesters
In this course, we will be learning how to use Javascript for Pentesting.
HOMEPAGE – https://www.pentesteracademy.com/course?id=11
Our Price: $3
Linux & IT , Security
Linux Forensics
This course will familiarize students with all aspects of Linux forensics. By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, analyze filesystems, analyze network traffic, analyze files, perform memory analysis, and analyze malware all on a Linux system with readily available free and open source tools. Students will …
Security , Shop
Network Pentesting
A non-exhaustive set of topics covered include:
- Pentesting Routers
- Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
- SNMP attacks
- Bypassing Firewalls
- Payloads and Shells
- HTTP/HTTPS tunneling
- Port Forwaring, Pivoting, Reverse Connects
- Privilege Escalation and UAC bypass
- Hash Dumping and Mimikatz
- Windows Sessions, Stations and Desktops
- Impersonation attacks
- WMIC post exploitation
- Hidden bind shells
- Bitsadmin
- Browser Password Recovery
- PAC Attacks
- DNS …
Security , Shop
Learn Cloud Security Architecture
The Cloud Security Architecture skill path teaches you enterprise security architecture concepts related to the cloud, including cloud infrastructure, data and application security.
This learning path provides an in-depth look at cloud security architecture. As you progress through 17 courses, you’ll build your knowledge and skills around cloud infrastructure and design, cloud data and application security, network security, secure storage, cryptography, …
Programming , Security
Python for Pentesters
This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administrators who want to learn to automate tasks or go beyond just using ready made tools. We will be covering topics in system security, network security, attacking web applications and services, exploitation …
Networking , Security
Cisco Certified CyberOps Associate
The Cisco Certified CyberOps Associate Learning Path prepares you to begin a career working with associate-level cybersecurity analysts within security operations centers. You’ll gain an understanding of basic cybersecurity principles, build a foundation of knowledge and develop your core skills.
HOMEPAGE – https://www.infosecinstitute.com/skills/learning-paths/ccna-cyber-ops/
Our Price: $5
Security , Shop
Cloud Service Provider (CSP) Security Features
Explore the ins and outs of choosing and working with AWS, Azure and GCP. For each cloud provider, we will review the native security controls they offer across several security domains, discuss the drawbacks of each cloud provider and look at areas to consider when working with that provider and solutions you should have in mind when moving to that …
Security , Shop
Cybersecurity Audit Fundamentals
The Cybersecurity Audit Learning Path helps you get to grips with the controls implemented by the organization to reduce the risk to confidentiality, integrity and availability down to an acceptable level. This path will help to identify your role as an auditor, why governance in security is important to the organization and how cybersecurity operates, and touch on some additional …
Security
Showing 370–378 of 578 results