• Shop , Security

    Pentester Academy – Web Application Pentesting

    A beginner friendly introduction to Web Application Security with starts from the very basics of the HTTP protocol and then takes on more advanced topics.

    web application penetration test is a type of ethical hacking engagement designed to assess the architecture, design and configuration of web applications. Assessments are conducted to identify cyber security risks that could lead to unauthorised access and/or data …

  • Shop , Security

    Become an AWS Certified Solutions Architect – Associate

    This certification path teaches you all you need to get started using Amazon Web Services (AWS), including the AWS Management Console, S3 buckets, EC2 instances, database services, security in the cloud and the costs associated with AWS. The first two courses cover the essentials of AWS. The remaining 16 courses build your knowledge and skills around the five domain areas …

  • Shop , Security

    Become a Certified Information Systems Security Professional (CISSP)

    This learning path prepares you to pass the prestigious Certified Information Systems Security Professional (CISSP) exam. As you progress through 24 courses, you’ll build your knowledge across a broad range of technical and management topics ranging from secure software development and cryptography to security governance and risk management. Upon completion you’ll be prepared to earn your CISSP, one of …

  • Shop , Security

    Cybrary – Metasploit

    Take an in-depth look at the Metasploit Framework so that you can be confident that you are using this tool to its fullest capabilities. Metasploit’s capabilities are wide, and this class will help you to prepare to run vulnerability assessments for organizations of any size. Here is what the class will cover: Fundamentals about the framework Framework organization How to install it …

  • Security , Shop

    Cybersecurity Web Application Defender

    The Cybersecurity Web Application Defender is a knowledge-based certificate offered by CSTT. As part of CCTT certificate program, the certificate is particularly relevant for recent college/university graduates and professionals in IT space, and those looking for a career change to cybersecurity.

    What You’ll Learn:

    • Understand Threat Modeling
  • Security , Shop

    Autopsy Basics and Hands On (8-Hours)

    Shows you how to install, configure, and use Autopsy to conduct a digital forensics investigation. Learn about hash sets, keyword searching, Android, timelines, and more. Includes hands-on labs. Requires basic digital forensics knowledge.

    Get training about the most popular open source digital forensics platform from the people who built it. Basis Technology is the most authoritative source for Autopsy Training material.

    This course …

  • Shop , Security

    Cybrary – USB Drop Attack

    Malicious devices are everywhere these days, whether you can see them or not. Some take the form of malicious wireless networks that steal information. Others are physically planted and can do practically anything a hacker desires. These devices are designed to destroy, steal, and infect all kinds of machines. Sometimes these devices can do their malicious tasks without a victim …

  • Shop , Security

    Infosec4TC – CISA – Certified Information Systems Auditor

    CISA – Certified Information Systems Auditor is a globally recognized certification for Information system Auditor that during this course you will learn how to audit IS and you will be able to clear the CISA Exam from the first attempt. The course will allow you to gain audit experience, knowledge and skills and indicate you are capable to assess vulnerabilities, …

  • Shop , Security

    ISACA – Certified Information Systems Auditor (CISA)

    CISA – Certified Information Systems Auditor is a globally recognized certification for Information system Auditor that during this course you will learn how to audit IS and you will be able to clear the CISA Exam from the first attempt. The course will allow you to gain audit experience, knowledge and skills and indicate you are capable to assess vulnerabilities, …