• Shop , Security

    EC-Council – Certified Penetration Testing Professional | CPENT (PDF-Videos)

    EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT …

  • Shop , Security

    Cybrary – Identifying Web Attacks Through Logs

    This course will review web application infrastructure, web servers, and the logs associated with them. We will also simulate 10 attack scenarios and identify the attack through logs that are generated by the web server

    An Akamai Report from 2018 described SQLi (SQL Injection), LFI (Local File Injection) and XSS (Cross-Site Scripting) as the most common web attacks. (https://blogs.akamai.com/2018/06/summer-soti—web-attacks.html)

    There are multiple …

  • Shop , Security

    Learn Computer Forensics

    This learning path is designed to build a foundation of knowledge and skills around computer forensics. As you progress through 13 courses, you’ll learn about conducting forensics on a variety of platforms and devices, including networks, file and operating systems, memory, email and browsers. Upon completion, you’ll have a base of computer forensics knowledge to carry over to your job …

  • Shop , Security

    InfosecInstitute.com – Become a Certified Ethical Hacker (CEH)

    This learning path teaches you the hacking skills and methodology needed to perform a penetration test against an organization. You’ll learn the foundations of ethical hacking and penetration testing as you progress through 12 courses tied to the seven Certified Ethical Hacker (CEH) exam objectives. Upon completion you’ll be prepared to earn your CEH certification and have an established base …

  • Shop , Security

    Certified Encryption Specialist (ECES)

    This course is an introduction to cryptography, it’s history, application, and all that is needed to pass the Certified Encryption Specialist certification exam.Topics include the history and application of cryptography and symmetric cryptography and hashes.

     

    HOMEPAGE – https://www.itpro.tv/courses/security-skills/eces/

     

    Our Price: $4
  • Shop , Security

    Reversing Hero

    ReversingHero is a Reverse Engineering self learning kit (x86_64 on linux) wrapped inside one binary file. It is made of 15 levels, with difficulty gradually increasing.

    This course contains step by step hints and solution videos for solving ReversingHero. To get the most of this course, you should try solving each level yourself, and watch the corresponding video only if you …

  • Shop , Security

    Cybrary – Certified Information System Auditor (CISA)

    For Cyber Security professionals who are interested in the field of audit, the Certified Information Systems Auditor (CISA) certification by ISACA is the leading credential to achieve. In order to face the dynamic requirements of meeting enterprise vulnerability management challenges, this course covers the information systems auditing control processes to ensure that you have the ability to analyze the state …

  • Shop , Security

    Cybrary – MITRE ATT&CK Defender™ (MAD) ATT&CK Series

    This course is the fundamental piece of the MITRE ATT&CK Defender™ (MAD) series where we will explore how a threat-informed mindset can help focus our efforts towards improving and understanding how our defenses actually fare against real-world adversaries. 

    This course prepares you for the ATT&CK® Security Operations Center Certification. In this course, students should will gain a better understanding of how …

  • Shop , Security

    Cybrary – Building an InfoSec Lab

    This course will guide you through the basics of incorporating several Information Security Engineering Tools in your home and/or lab. By building this lab you will be able to obtain corporate-level security within your home network, as well as a higher understanding of the capabilities and advantages these tools bring to your network.

    This course will also help mirror an infrastructure …