Shop , Security
Container Security
Docker and Linux containers are changing the way applications are developed, tested and deployed. The Container Security Learning Path provides an overview of the key technologies used by Docker containers and how to utilize them for security. The learning path includes a review of Kubernetes, the most popular container orchestration system, focused on creating and running a secure cluster.
HOMEPAGE – …
Shop , Security
EC-Council – Open Source Intelligence
If you have ever wondered how somebody is able to find that much information or data about you or your organization, then this is the course for you. Since Open-Source Intelligence is one of the most crucial phases in any cyberattack, you will find out what the bad guys can learn about you or your company. Information and data have …
Security , Shop
Automated Mobile Application Security Assessment with MobSF
Mobile Application market is growing like anything and so is the Mobile Security industry. With lots of frequent application releases and updates happening, conducting the complete security analysis of mobile applications becomes time consuming and cumbersome mainly because of the overheads in setting up and maintaining a mobile application testing environment. This course will introduce an extendable, and scalable web …
Shop , Security
Mastering Nmap Course
Nmap is the most powerful information gathering tool. It has many advanced features. This is a very popular tools among hackers, network admins and pentester.
If you want to be a successful network admin then you have to expertise the nmap because it help network admins to do pentest the network and patch some of the vulnerability and if you don’t …
Security , Shop
Node.js Security: Pentesting and Exploitation
Node.js® is a platform built on Chrome’s JavaScript runtime for easily building fast, scalable network applications. This new technology is widely getting adopted in various organisations. Like any platform, Node.js has it’s on set of features that developers blindly use without much thought on security. The heart of Node is JavaScript, so it inherits most of the issues that are …
Shop , Security
Black Hat Python: Python For Pentesters
Need automated testing tools? This is the right time to switch to Python. Packed with many reverse engineering and exploitation libraries, Python is a great language to learn if you want a secure execution of all your information security tasks.
Starting from scratch this course will enable you to all the latest tools and techniques available for Python penetration testing.
This course …
Shop , Security
Securing Your Network from Attacks
Attacks on enterprise networks and home networks are a growing problem with daily targeted attacks that can result in crippling results. These attacks have become more aggressive, sophisticated, and more dangerous over the years.
This course is designed to give you the knowledge and skills to identify, mitigate, and prevent these attacks and help you secure your network. The course is …Shop , Security
Wireless Pentesting with the Raspberry Pi
Attack on Wireless Networks by hackers is the most common threat to the businesses in modern world. This course wil<span class="NormalTextRun ...
Shop , Security
WebSecNinja: Lesser Known WebAttacks
WebSecNinja: Lesser Known WebAttacks is a brand new and unique web security course that takes the learner to the next level of web security. A perfect blend of latest and lesser known web attacks that are explained with ultimate details and accompanied by demos and “how tos” that you can apply in real world red-team pentesting and security assessments. The …
Security
Showing 604–612 of 692 resultsSorted by latest