Security , Shop
Practical Threat Hunting
Practical Threat Hunting is a foundational course that will teach you how to approach threat hunting using a proven, structured, repeatable framework. I created this course to help people figure out what to hunt for, where to find it, and how to look for it.
Practical Threat Hunting is the course that will teach you to hunt in a way that will never …
Security , Shop
eLearnSecurity – Threat Hunting Professional v2
Course at a glance
- Establish a proactive defense mentality
- Hunt for threats in your organization’s systems and network
- Use threat intelligence or hypotheses to hunt for known and unknown threats
- Inspect network traffic and identify abnormal activity in it
- Perform memory forensics using Redline, Volatility and a variety of tools to identify in-memory malware
- Use tools such as Sysmon and …
Security , Shop
Antivirus Evasion Course By DedSec (In Hindi)
Course Topic
- Introduction of AVS Crypters & Virus
- Bypass AVS Runtime using Based64 Technique
- Signature Cloning Bypassing Runtime
- Bypass Windows Defender For Lifetime
- Make your Stub Clean
- Manually Encrypting Virus using Algorithm
- Using Different Algorithm For Cleaning Virus
- Making FUD Virus Using C# And HEX
- Code Your Own Crypter
- Android Botnet
HOMEPAGE – https://www.dedseec.com/product/antivirus-evasion-professional-course/
Original Price: $25
Our Price: $5
Security , Shop
Advance Of Black Hat Hacking Course By DedSec (In Hindi)
Course Topic
- Advance WIFI Hacking
- Android Hacking
- Android Screen Lock Cracking
- Attack and down All Wifi networks In Your Area
- Basic of Linux Operating System
- BeFF Over WAN Attack
- Black Hat Mailing
- Bug Bunty English
- Carding
- CCTV Camera Hacking
- Crack any software
- Dos And DDOS Attacks
- Email Bombing
- Email Hunting
- Hacking With Wireshark
- Information Gathering
- Making Money Online
- MITM Attack …
Security , Shop
Reverse Engineering Course – The Hacks Behind Cracking By DedSec (In Hindi)
Description:In this Reverse Engineering training course, expert DedSec will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in RE.You will start by learning about reversing compiled Windows applications,Once you have completed this …
Security , Shop
eLearnSecurity – Mobile Application Security and Penetration Testing v2
Course at a glance
- Start from iOS and Android architectures basics
- Exposes Android and iOS vulnerabilities in-depth
- Covers mobile OSs security mechanisms and implementations
- Covers Mobile applications reverse engineering
- In depth mobile applications static and dynamic analysis
- Practice on real world mobile applications
- Build your own home lab on mobile application security
- Provides you the skills necessary to peform Penetration tests of mobile applications
- Covers: APKTool, …
Security , Shop
Open-Source Intelligence (OSINT) Fundamentals
Description
This course focuses on Open Source Intelligence (OSINT) tactics and techniques designed to help you improve your investigative game. Students should take this course if they are interested in:
- Gaining a better understanding of OSINT techniques
- Improving investigative skillset
- Improving overall research methodology
HOMEPAGE – https://academy.tcm-sec.com/p/osint-fundamentals
Original Price: $30
Our Price: $5
Security , Shop
eLearnSecurity – Web Application Penetration Testing v3
Course at a glance
- Start from the very basics, all the way to advanced post-exploitation activities
- Wide coverage of OWASP’s TOP 10
- Master Burp Suite
- In-depth Web application analysis, information gathering and enumeration
- XSS & SQL Injection
- Session related vulnerabilities
- LFI/RFI
- HTML5 attacks
- Pentesting Content Management Systems (CMS)
- Pentesting NoSQL databases and NoSQL-related APIs / NoSQL injections
- Start from Web …
Security , Shop
eLearnSecurity – Practical Web Defense
Course at a glance
- Close the gap between Web application attack and defense
- Mitigation advices for multiple platforms and languages
- The most comprehensive and practical coverage of the OWASP Testing Guide
- Comprehensively aligned to OWASP methodologies, tools and tests
- Covers and goes beyond OWASP TOP 10
- Detailed techniques and methodology to simplify defense of web applications
- No boring theory: practice oriented curriculum
…
Security
Showing 604–612 of 620 results