Security , Shop
Exploit Development Student
If you are looking for the most practical way into the exploit development and software security world look no further. The Exploit Development Student Learning Path provides not only the fundamentals of Windows and Linux exploit development but also covers advanced Windows and Linux exploit development techniques, as well as anti-exploit mechanism bypasses.
Course at a glance
- Based on techniques professional …
- Based on techniques professional …
Security , Shop
[PentesterAcademy] Wi-Fi Monitoring for Red-Blue Teams
This course focuses on the tools, techniques and procedures to monitor 802.11ac/n networks. We will be learning about both USB and Access Point hardware, pros and cons, and scalable architectures. We will be looking at different hardware for monitoring ranging in price from $40 to $350 and above, both USB and Access Point solutions.
A non-exhaustive list of topics to be …
Security , Shop
Elearnsecurity – Penetration Testing eXtreme v2
Course at a glance
- Obscure ways of exploitation and backdooring
- Advanced client side exploitation techniques
- Custom attack vector and payload creation
- In depth Active Directory Reconnaissance & Enumeration
- In depth analysis of Active Directory exploitation
- Stealthy lateral movement and evasion against modern defenses
- In depth analysis of critical domain infrastructure exploitation
- In depth details of common misconfigurations and weaknesses
- Details …
Security , Shop
eLearnSecurity – Web Application Penetration Testing eXtreme v2
Course at a glance
- The most advanced course on Web App Pentesting
- Based on techniques professional pentesters use
- Master advanced Web Application attacks & security tools
- In-depth Web Application Vulnerabilities analysis
- Covers XSS, SQL Injection, HTML5 and much more
- In-depth obfuscation and encoding techniques
- Bypassing filters and WAF techniques included
- Explore HTML5 and XML attacks vectors and exploits
- Explore advanced …
Security , Shop
eLearnSecurity – Penetration Testing Professional v5
The eCPPT designation stands for eLearnSecurity Certified Professional Penetration Tester. eCPPT is a 100% practical and highly respected Ethical Hacking and Penetration Testing Professional certification counting certified professional in all the five continents.
By obtaining the eCPPT, your skills in the following areas will be assessed and certified:
- Penetration testing processes and methodologies, against Windows …
- Penetration testing processes and methodologies, against Windows …
Security , Shop
Elearnsecurity – Reverse engineering professional & Malware Analysis Professional
eLearnSecurity Certified Malware Analysis Professional (eCMAP) certification is the most practical and professionally-oriented certification you can obtain in malware analysis. Instead of putting you through a series of multiple-choice questions, you are expected to perform a full analysis on a given malware sample, show proof of what the malware does, and finally write a signature that could be …
Security , Shop
OSCP PEN-200 Penetration Testing with Kali Linux 2023
Penetration Testing with Kali Linux is the foundational course at Offensive Security. Those new to OffSec or penetration testing should start here.
This online ethical hacking course is self-paced. It introduces penetration testing tools and techniques via hands-on experience. PWK trains not only the skills, but also the mindset required to be a successful penetration tester. PWK is the foundational penetration …
Security , Shop
Elearnsecurity – Digital Forensics Professional
Course at a glance
- Learn how to acquire volatile and non-volatile data, using various techniques
- Dive into the structure of files and then, analyze file headers, malicious documents, and file metadata
- Become familiar with walking through partitions, recovering corrupted disks and locating hidden data
- Learn how to analyze both FAT & NTFS file systems
- Get familiar with file carving and …
Security
Showing 613–620 of 620 results