Showing 37–45 of 574 results

  • Security , Shop

    Detection Engineering with Sigma

    Sigma is the open standard language for writing detection queries for logs. In this class, you’ll get hands-on experience writing, modifying, and interpreting Sigma rules based on real-world detection scenarios.

     

    HOMEPAGE – https://www.networkdefense.io/library/detection-engineering-with-sigma-58157/310172/about/

     

    Original Price: $397
    Our Price: $20
  • Security , Shop

    Splunk for Security Analysts

    Learn how to use Splunk to find threats, centralize data, and make sense of logs. Built for security analysts who want to learn Splunk… by security analysts who use Splunk every day.

    Whether you’re a SOC analyst trying to prove an alert is a false positive, a responder looking for indications of lateral movement, a threat intel analyst tryiing to identify …

  • Security , Shop

    RTFM Video Library

    ACE all the assessment questions and the uniquely numbered RTFM Challenge coin and Credly badge are yours. You deserve it.

     

    HOMEPAGE – https://www.thertfm.com/rtfm-video-library

     

    Original Price: $197
    Our Price: $25
  • Security , Shop

    Red Team Wi-Fi

    The ultimate course to uncover modern Wi-Fi offensive attacks and counter measurements for Red Team and Blue Team purposes.

     

    HOMEPAGE – https://hackademy.penthertz.com/course/red-team-wi-fi

     

    Original Price: $736
    Our Price: $25
  • Security , Shop

    Offensive Red Team Training

    The training is divided in five sections: Initial foothold, Gaining access, Offensive Coding, internal reconnaissance and lateral movement. The training will cover each section in depth by providing technical evidence of how each technique works. Red team exercises are performed to assess responsiveness and detection capability. As a red teamer, it is important to understand what each tool and commands …

  • Security , Shop

    Hacking and Securing Cloud Infrastructure

    This 4-day course cuts through the mystery of Cloud Services (including AWS, Azure, and Google Cloud Platform) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing traditional network infrastructure. Whether you are an Architect, …

  • Security , Shop

    NEXT-LEVEL BUG HUNTING – CODE EDITION

    Ready to take bug hunting to a deeper level? Been tasked with reviewing source for SQL Injection, XSS, Access Control and other security flaws? Does the idea of reviewing this code leave you with heartburn? This course introduces a proven methodology and framework for performing a secure code review, as well as addressing common challenges in modern secure code review. …

  • Security , Shop

    Advanced Infrastructure Hacking

    Our Advanced Infrastructure Hacking course is designed for those who wish to push their knowledge. Whether you are Pen Testing, Red Teaming or trying to get a better understanding of managing vulnerabilities in your environment, understanding advanced hacking techniques is critical.

    This course teaches the audience a wealth of advanced Pen Testing techniques, from the neat, to the new, to …

  • Programming , Security

    Advanced Windows Kernel Programming

    The course will include advanced topics in Windows kernel development, and is recommended for those that were in my Windows Kernel Programming class or have equivalent knowledge;

     

    HOMEPAGE – https://scorpiosoftware.net/2023/02/17/upcoming-public-training-classes-for-april-may/

     

    Original Price: $950
    Our Price: $20