Showing 478–486 of 580 results

  • Security , Shop

    Reverse Engineering with Radare2

    In this course we will learn about the Radare2 reverse engineering framework. It is an open source free alternative to IDA Pro. I started to work with it because I think nobody will buy IDA Pro unless it is paid by your employer. Radare2 is a perfect free alternative, its only disadvantage is that it could be hard to start using it. This is …

  • Security , Shop

    ITPRO.TV – Python for Security

    Python is a great language for learning, writing web applications, and manipulating data. However, Python can be used for security testing as well. In this series, we will explore the use of Python in such concepts as brute force password cracking, making SSH connections programmatically, creating socket connections and port scanner a particular host, banner grabbing from open ports, and …

  • Security , Shop

    CyberDefense Pro (2021)

    CyberDefense Pro helps you teach students how to monitor and respond to traffic both proactively and analytically, using hands-on labs that challenge with high-stake scenarios they’ll face on the job. It covers 60 of the most up-to-date tools, like Burp Suite, Wireshark, Metasploit, Ettercap, and Nmap, to learn job skills used by Incident Responders, Threat Intelligence Analysts, and Cybersecurity Analysts …

  • Security , Shop

    ITPRO.TV – Penetration Testing

    In this series, Daniel and Mike discuss, explain, and demonstrate some of the common tools and techniques used by Penetrations Testers during a security audit. Watch as they explore topics like hacking platforms and test environments, creating BIND/REVERSE shells, discovering and exploiting Buffer Overflows, Cross Site Scripting attacks, Local and Remote File Inclusion attacks, SQL-Injection, Password …

  • Security , Shop

    Cybrary – Post Exploitation Hacking

    Increase your offensive Cyber Security knowledge with online Post Exploitation Hacking training. This online self-paced training will point you in the right direction with a methodology proven to provide the best results when performing hacking activities on highly secured systems with the mission objectives in mind, a skill needed for offensive hackers to be successful in their field.

    As the name …

  • Security , Shop

    Cybrary – Computer Hacking and Forensics

    Digital crime is more prevalent than ever, and the attacks are getting highly complex. Security software can’t pinpoint it—the eyes and expertise of a trained computer forensics professional is necessary. Our online Computer Hacking and Forensics training course teaches you how to become that professional. Love the idea of digital forensics investigation? That’s what computer forensics is all about. You’ll …

  • Security , Shop

    Cybercrime And You: Staying Safe in a Hyper-Connected World

    In our hyper-connected world, where instant communication between people, data and machines occurs over global, open networks, cybercrime has become an inescapable part of our daily lives.

    More and more people are increasingly reliant on online spaces to live, study, work, and entertainment and leisure. However, without the requisite cybersecurity infrastructure and knowledge as we learn and work from home, we …

  • Security , Shop

    Container Security

    Docker and Linux containers are changing the way applications are developed, tested and deployed. The Container Security Learning Path provides an overview of the key technologies used by Docker containers and how to utilize them for security. The learning path includes a review of Kubernetes, the most popular container orchestration system, focused on creating and running a secure cluster.

     

    HOMEPAGE – …

  • Security , Shop

    EC-Council – Open Source Intelligence

    If you have ever wondered how somebody is able to find that much information or data about you or your organization, then this is the course for you. Since Open-Source Intelligence is one of the most crucial phases in any cyberattack, you will find out what the bad guys can learn about you or your company. Information and data have …