Showing 604–612 of 1052 results

  • Security , Shop

    Breaching the Cloud w/ Beau Bullock

    Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this training course, hacking concepts will be introduced for each of those services.

    This training walks through a complete penetration testing methodology of cloud-based infrastructure. …

  • Animation & Graphics , Shop

    Making 2D Cyberpunk Street in Photoshop and Animating It in After Effects

    In this course, Rutger will show you how to create a cyberpunk street scene and finally transform it into a camera movement animation. This course is suitable for beginner concept artists who have difficulty in composition and color use.

    Through this course, you will learn how to merge inspiration and reference to organize the street composition and learn how to adjust …

  • Security , Shop

    Azure Pentesting

    This on-demand course is intended for IT and security professionals who want to apply the most common attacks and security pitfalls in order to compromise an Azure Tenant. We will discuss different ways of achieving initial access, privilege escalation and persistence in a compromised environment. Furthermore, to evaluate and understand the risks that a legacy on-premise environment brings to a …

  • Programming , Shop

    Java Programming Masterclass covering Java 11 & Java 17

    The course is a whopping 80 hours long.  Perhaps you have looked at the size of the course and are feeling a little overwhelmed at the prospect of finding time to complete it.   Maybe you are wondering if you need to go through it all?

    Firstly, Laura’s story above shows that you do not have to complete the entire course – she …

  • Security , Shop

    Advanced Web Attacks and Exploitation – WEB-300

    Advanced Web Attacks and Exploitation (WEB-300) is an advanced web application security course. We teach the skills needed to conduct white box web app penetration tests.

    The bulk of your time will be spent analyzing source code, decompiling Java, debugging DLLs, manipulating requests, and more, using tools like Burp Suite, dnSpy, JD-GUI, Visual Studio, and the trusty text editor.

     

    HOMEPAGE – https://www.anonymz.com/?https://www.offensive-security.com/awae-oswe/

     

    Original …

  • Security , Shop

    Active Defense & Cyber Deception w/ John Strand

    Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between.

    In this class, you will learn how to …

  • Security , Shop

    The Metasploit Framework Bootcamp

    The Metasploit Framework is one of the most widely utilized exploitation tools used by penetration testers and security researchers. For anyone looking to get started with a career in cybersecurity and penetration testing, the ability to use the Metasploit framework to conduct penetration tests and security audits is an essential skill to master on your path to becoming a competent …

  • Programming , Shop

    Windows Kernel Programming: Fundamentals

    In this course, we will learn the fundamentals of Windows kernel programming. We will start with I/O systems and learn how to write simple device drivers. We will also take a look at the I/O request packet to write more complex drivers.

     

    HOMEPAGE – https://www.pentesteracademy.com/course?id=58

     

    Our Price: $3
  • Security , Shop

    Email and Browser Forensics

    Explore a variety of concepts around email and browser forensics and learn how those concepts are applied in this eleven-video course.

    They say you can tell a lot about someone by the company they keep — or the emails they write. Eleven videos take an in-depth look at the art of email and browser forensics, from the advantages (or disadvantages) of …