Security , Shop
Detection Engineering with Sigma
Sigma is the open standard language for writing detection queries for logs. In this class, you’ll get hands-on experience writing, modifying, and interpreting Sigma rules based on real-world detection scenarios.
HOMEPAGE – https://www.networkdefense.io/library/detection-engineering-with-sigma-58157/310172/about/
Original Price: $397
Our Price: $20
Security , Shop
Splunk for Security Analysts
Learn how to use Splunk to find threats, centralize data, and make sense of logs. Built for security analysts who want to learn Splunk… by security analysts who use Splunk every day.
Whether you’re a SOC analyst trying to prove an alert is a false positive, a responder looking for indications of lateral movement, a threat intel analyst tryiing to identify …
Security , Shop
RTFM Video Library
ACE all the assessment questions and the uniquely numbered RTFM Challenge coin and Credly badge are yours. You deserve it.
HOMEPAGE – https://www.thertfm.com/rtfm-video-library
Original Price: $197
Our Price: $25
Security , Shop
Red Team Wi-Fi
The ultimate course to uncover modern Wi-Fi offensive attacks and counter measurements for Red Team and Blue Team purposes.
HOMEPAGE – https://hackademy.penthertz.com/course/red-team-wi-fi
Original Price: $736
Our Price: $25
Security , Shop
Offensive Red Team Training
The training is divided in five sections: Initial foothold, Gaining access, Offensive Coding, internal reconnaissance and lateral movement. The training will cover each section in depth by providing technical evidence of how each technique works. Red team exercises are performed to assess responsiveness and detection capability. As a red teamer, it is important to understand what each tool and commands …
Security , Shop
Hacking and Securing Cloud Infrastructure
This 4-day course cuts through the mystery of Cloud Services (including AWS, Azure, and Google Cloud Platform) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing traditional network infrastructure. Whether you are an Architect, …
Security , Shop
NEXT-LEVEL BUG HUNTING – CODE EDITION
Ready to take bug hunting to a deeper level? Been tasked with reviewing source for SQL Injection, XSS, Access Control and other security flaws? Does the idea of reviewing this code leave you with heartburn? This course introduces a proven methodology and framework for performing a secure code review, as well as addressing common challenges in modern secure code review. …
Security , Shop
Advanced Infrastructure Hacking
Our Advanced Infrastructure Hacking course is designed for those who wish to push their knowledge. Whether you are Pen Testing, Red Teaming or trying to get a better understanding of managing vulnerabilities in your environment, understanding advanced hacking techniques is critical.
This course teaches the audience a wealth of advanced Pen Testing techniques, from the neat, to the new, to …
Programming , Security
Advanced Windows Kernel Programming
The course will include advanced topics in Windows kernel development, and is recommended for those that were in my Windows Kernel Programming class or have equivalent knowledge;
HOMEPAGE – https://scorpiosoftware.net/2023/02/17/upcoming-public-training-classes-for-april-may/
Original Price: $950
Our Price: $20
Security
Showing 37–45 of 574 results