Security , Shop
AI Security and Responsible AI Practices
Get the essential skills to protect your AI system against cyber attacks. Explore how generative AI and LLMs can be harnessed to secure your projects and organizations against AI cyber threats. Develop secure and ethical systems while being mindful of privacy concerns with real-life examples that we use on a daily-basis with ChatGPT, GitHub Co-pilot, DALL-E, Midjourney, DreamStudio (Stable Diffusion), …
Security , Shop
SANS LDR516: Building and Leading Vulnerability Management Programs (PDF-VID)
Vulnerability, patch, and configuration management are not new security topics. In fact, they are some of the oldest security functions. Yet, we still struggle to manage these capabilities effectively. The quantity of outstanding vulnerabilities for most large organizations is overwhelming, and all organizations struggle to keep up with the never-ending onslaught of new vulnerabilities in their infrastructure and applications. When …
Security , Shop
Multi-Cloud Red Team Analyst [MCRTA]
- Begin your Cloud Red Team Journey with MCRTA
- Introduction to AWS, Azure & GCP Cloud Security
- 100% Practical Cloud Security Red Team Course
- Learn Multi-Cloud Red Team Fundamentals
HOMEPAGE – https://cyberwarfare.live/product/multi-cloud-red-team-analyst-mcrta/
Original Price: $49
Our Price: $6
Security , Shop
x33fcon – From zero to first 0-day!
In the beginning, we will focus on understanding techniques: binary analysis, searching for various types of vulnerabilities and debugging. We “bite” into practical fuzzing and mistakes that keep programmers awake at night using their non-deterministic occurrence. Participants will learn techniques for analyzing application weaknesses, writing grammars, and obtaining test corpora guaranteeing exciting results.After understanding the aspects of bughunting, …Security , Shop
ANDROID USERLAND FUZZING AND EXPLOITATION
During this course, you will be introduced to the world of Android user-land exploitation techniques used by threat actors. We will start by covering the basics of ARM assembly language and move into reversing the Android Native components to find vulnerabilities. During reverse engineering, we will teach how to find functions that can be harnessed and fuzzed to identify 0-day …
Security , Shop
SOC Analyst (Blue Team) Live Workshop
Our Blue Team Live Workshop is not your ordinary online course. This is a live, interactive, and hands-on workshop that immerses you in the real-world scenarios and challenges of a SOC analyst. You will learn how to use the latest tools and techniques to monitor, detect, and respond to cyberattacks and breaches.
This program offers an excellent opportunity to develop the …
Security , Shop
Red Team Infra Dev [CRT-ID]
- Develop OPSEC safe Red Team Infrastructure
- Utilize Red Team Infra for Internal / External Operations
- Utilize Legitimate Cloud / On-Premise Services
- Create your own Re-director / Payload Server Features
- Perform Professional Red Team Attack Case Study
HOMEPAGE – https://cyberwarfare.live/product/red-team-infra-developer/
Original Price: $49
Our Price: $7
Security , Shop
Windbg – A complete guide for Advanced Windows Debugging
Have you ever felt your windows operating system is hung or becoming slow or having a BSOD? Or an application crash or application hang or slow on windows? Have you had to press the restart button of your PC or the windows server to get rid of the problem and had no clue when that issue will happen again? Or you’re asked to analyse a …
Linux & IT , Security
Linux Forensics w/ Hal Pomeranz
This hands-on course is a quick start into the world of Linux forensics. Learn how to use memory forensics to rapidly triage systems and spot attacker malware and rootkits. Learn where the most critical on-disk artifacts live and how they can help further an investigation. Rapidly process Linux logs and build a clearer picture of what happened on the system.
HOMEPAGE …
Security
Showing 55–63 of 620 results