Shop , Security
ITPRO.TV – Mobile Security
In this episode, Ronnie and Don discuss and demonstrate the exposure we have from unmanned mobile devices within a managed network. Don describes some of the problems with them as well as the possible attacks. He then demonstrates the way built security is working to protect itself on an Apple device by segregating applications and isolatingthe communication between application and …
Shop , Security
Practical Hacking Master Class
The Authors of this course or Any Party Related to this Course or Authors will not be Responsible for any Damages done by you to anyone in any way after taking this course, We Intend to Make a Better Cyber World by Teaching Every Little Practical Thing, and We Motivate you to use this Knowledge For Good Purposes.
HOMEPAGE – <a ...
Shop , Security
Pentester Academy – Log File Analysis
A log file analysis helps web masters gather statistics and key figures about the usage of a website or web server. Log file analysis is based on log files, which log all accesses to a web server. Today, JavaScript based tracking tools such as Google analytics have in many cases replaced the traditional analysis of log files.
A log file analysis often involves …
Shop , Security
Bitdegree.org – Hacking Masterclass Ethical Hacking Course for Career Accelerator
A lot of people get suspicious when they hear the term hacking. They associate it with criminal activity, harmful attacks, and stolen data leaks. They’re not wrong… To a certain degree.
There are actually three types of hackers, commonly known as black hat, grey hat, and white hat. The kind described above wears the darkest one, of course. A grey hat hacker …
Shop , Programming
Coursera.org – Secure Coding Practices Specialization
This Specialization is intended for software developers of any level who are not yet fluent with secure coding and programming techniques.Through four courses, you will cover the principles of secure coding, concepts of threat modeling and cryptography and exploit vulnerabilities in both C/C++ and Java languages, which will prepare you to think like a hacker and protect your organizations information. …
Shop , Security
Pentester Academy – Android Security and Exploitation for Pentesters
Android Security and Exploitation for Pentesters is a course intended for people who want to get started into Android Security, or even who are a bit familiar with the Android security space but want to learn more about Android Application Security. This is a hands-on course where you will get to reverse applications, find security vulnerabilities, perform debugging and API …
Shop , Security
Pentester Academy – Windows Forensics
This course will familiarize students with all aspects of Windows forensics.By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, analyze filesystems, analyze network traffic, analyze files, perform memory analysis, and analyze malware for a Windows subject on a Linux system with readily available free and open source tools. Students will also …
Shop , Security
Pentester Academy – Make your own Hacker Gadget
All of us have heard about or used Hacker Gadgets like the WiFi Pineapple, Minipwner, Pwn Plug, R00tabaga etc. They are fantastic to use for demos, in social engineering tasks, explaining security implications in a fun way to non security professionals and in actual pentest task automation! but what does it take to build one? In this course, we will …
Shop , Security
Pentester Academy – USB Forensics and Pentesting
This course will cover USB in detail with an emphasis on understanding USB Mass Storage devices (also known as flash drives or thumb drives).By the end of this course students will know how to sniff USB traffic using open source tools, be able to write-block USB mass storage devices using software and microcontroller-based hardware, be able to impersonate other USB …
Security
Showing 631–639 of 692 resultsSorted by latest