Showing 523–531 of 584 results

  • Security , Shop

    Pentester Academy – Windows Forensics

    This course will familiarize students with all aspects of Windows forensics.By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, analyze filesystems, analyze network traffic, analyze files, perform memory analysis, and analyze malware for a Windows subject on a Linux system with readily available free and open source tools.  Students will also …

  • Security , Shop

    Pentester Academy – Make your own Hacker Gadget

    All of us have heard about or used Hacker Gadgets like the WiFi Pineapple, Minipwner, Pwn Plug, R00tabaga etc. They are fantastic to use for demos, in social engineering tasks, explaining security implications in a fun way to non security professionals and in actual pentest task automation! but what does it take to build one? In this course, we will …

  • Security , Shop

    Pentester Academy – USB Forensics and Pentesting

    This course will cover USB in detail with an emphasis on understanding USB Mass Storage devices (also known as flash drives or thumb drives).By the end of this course students will know how to sniff USB traffic using open source tools, be able to write-block USB mass storage devices using software and microcontroller-based hardware, be able to impersonate other USB …

  • Security , Shop

    Pentester Academy – Web Application Pentesting

    A beginner friendly introduction to Web Application Security with starts from the very basics of the HTTP protocol and then takes on more advanced topics.

    web application penetration test is a type of ethical hacking engagement designed to assess the architecture, design and configuration of web applications. Assessments are conducted to identify cyber security risks that could lead to unauthorised access and/or data …

  • Security , Shop

    Become an AWS Certified Solutions Architect – Associate

    This certification path teaches you all you need to get started using Amazon Web Services (AWS), including the AWS Management Console, S3 buckets, EC2 instances, database services, security in the cloud and the costs associated with AWS. The first two courses cover the essentials of AWS. The remaining 16 courses build your knowledge and skills around the five domain areas …

  • Security , Shop

    Become a Certified Information Systems Security Professional (CISSP)

    This learning path prepares you to pass the prestigious Certified Information Systems Security Professional (CISSP) exam. As you progress through 24 courses, you’ll build your knowledge across a broad range of technical and management topics ranging from secure software development and cryptography to security governance and risk management. Upon completion you’ll be prepared to earn your CISSP, one of …

  • Security , Shop

    Cybrary – Metasploit

    Take an in-depth look at the Metasploit Framework so that you can be confident that you are using this tool to its fullest capabilities. Metasploit’s capabilities are wide, and this class will help you to prepare to run vulnerability assessments for organizations of any size. Here is what the class will cover: Fundamentals about the framework Framework organization How to install it …

  • Security , Shop

    Cybersecurity Web Application Defender

    The Cybersecurity Web Application Defender is a knowledge-based certificate offered by CSTT. As part of CCTT certificate program, the certificate is particularly relevant for recent college/university graduates and professionals in IT space, and those looking for a career change to cybersecurity.

    What You’ll Learn:

    • Understand Threat Modeling
  • Security , Shop

    Autopsy Basics and Hands On (8-Hours)

    Shows you how to install, configure, and use Autopsy to conduct a digital forensics investigation. Learn about hash sets, keyword searching, Android, timelines, and more. Includes hands-on labs. Requires basic digital forensics knowledge.

    Get training about the most popular open source digital forensics platform from the people who built it. Basis Technology is the most authoritative source for Autopsy Training material.

    This course …