• Security , Shop

    Osquery for Security Analysis

    Osquery for Security Analysis will teach you how to use Osquery to perform thorough investigations of hosts on your network. This isn’t just an Osquery tutorial, it’s a course designed to help you improve your host-based investigation skills using one of the best tools for the job.

    A production server that doesn’t normally communicate over the internet is exhibiting suspicious characteristics. It’s …

  • Security , Shop

    Investigation Theory

    If you’re a security analyst responsible for investigating alerts, performing forensics, or responding to incidents then this is the course that will help you gain a deep understanding how to most effectively catch bad guys and kick them out of your network. Investigation Theory is designed to help you overcome the challenges commonly associated finding and catching bad guys.

    • I’ve got so …
  • Security , Shop

    ELK for Security Analysis

    You must master your data If you want to catch bad guys and find evil. But, how can you do that? That’s where the ELK stack comes in.

    ELK is Elasticsearch, Logstash, and Kibana and together they provide a framework for collecting, storing, and investigating network security data. In this course, you’ll learn how to use this powerful trio to perform …

  • Security , Shop

    Practical Packet Analysis

    It’s easy to fire up Wireshark and capture some packets…but making sense of them is another story. There’s nothing more frustrating than knowing the answers you need lie in a mountain of data that you don’t know how to sift through. That’s why I wrote the first Practical Packet Analysis book a decade ago. That book is now in its …

  • Security , Shop

    INE – OSCP Security Technology Prep Course

    This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python …

  • Security , Shop

    INE – Wireshark Advanced Technologies

    This Wireshark Advanced Technologies course, taught by bestselling author and trainer Robert Shimonski, features nearly 11 hours of training and is designed to provide network administrators with the practical skills needed to solve problems, analyze data, view the inner workings of packets, and perform advanced configurations to solve tough issues. In this course, Rob covers more advanced troubleshooting techniques, how …

  • Security , Shop

    Cross-Site Scripting (XSS) Training Course

    If you’ve only read about Cross-Site Scripting online, and you haven’t had the pleasure of working directly with attacks and exploits beyond launching an alert, then you’re absolutely just scratching the surface of all there is to learn.

    Most likely, you’ve been through some kind of basic training where you mostly just copied and pasted some generic code without much explanation.

    But …

  • Security , Shop

    eLearnSecurity – Practical Network Defense

    Course at a glance

    • Close the gap between Network attack and defense
    • Teaches defense which is valuable for both the defense team and offense team
    • Full practical setup guides
    • Configuration features to control, identify and prevent threats
    • Secure network design concepts and configuration of network appliances
    • 10 different lab scenarios to practice with
    • Configure secure remote access with practical examples
    • Windows configuration policies, …
  • Security , Shop

    eLearnSecurity – Incident Handling & Response Professional

    Course at a glance

    • Start from the very basics, all the way to advanced incident response activities
    • Professionally analyze, handle, and respond to security incidents on heterogeneous networks and assets
    • Understand the mechanics of modern cyber-attacks and how to detect them
    • Effectively use and fine-tune open source IDS (Bro, Snort, Suricata)
    • Make the best of open source SIEM solutions (ELK …