Showing 1–9 of 248 results

  • Shop , Security & Hacking

    Network Hacking Continued – Intermediate to Advanced

    Do you want to take your network hacking skills to the next level? how about building your own network hacking scripts?

    All the attacks in this course are practical attacks that work against real computers, in each technique you will understand the theory behind it and how it works, then you’ll learn how to use that technique in a real life …

  • Shop , Security & Hacking

    Windows Process Injection for Red-Blue Teams

    In this course, we will understand the basics of Windows processes, virtual memory and different techniques to enumerate processes. Then we will look at the fundamentals of process injection and try out techniques like remote Thread Injection, APC, Thread Hijacking and Process Hollowing.

    This course is very practical with code examples to illustrate each technique!

     

    HOMEPAGE – https://www.anonymz.com/?https://www.pentesteracademy.com/course?id=50

     

    Our Price: $7
  • Shop , Security & Hacking

    Cryptography: A Hands-on Approach

    Cryptography is a foundation in cybersecurity. It is the underlying building block of many defense mechanisms, systems, and protocols.  Without crypto, we will not be able to safely conduct many things on the Internet, such as web browsing, online banking, working remotely, etc. Without crypto, blockchain and cryptocurrency will not exist.

    In this course, we systematically study the basic principles of …

  • Shop , Security & Hacking

    Case Studies of Award-Winning XSS Attacks: Part 2

    This course is the follow-up to one of my previous courses – “Case-Studies of Award-Winning XSS Attacks: Part 1”. We will continue our XSS hunting journey and you will learn more about award-winning XSS attacks.

    There are many people hunting for XSSs, but only a few of them are successful and earn a 4-digit ($$$$) reward per single XSS. What makes …

  • Shop , Security & Hacking

    Certified Incident Handler (ECIH) v2

    This course covers the exam objectives of EC-Council’s Certified Incident Handler v2 (E|CIH) program. It discusses the basic skills to handle and respond to security events and addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The incident handling skills taught in E|CIH are complementary to the job roles below as well …

  • Shop , Security & Hacking

    CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL (CSSLP)

    Prepare for the CSSLP certification by acquiring the knowledge to create and maintain secure software throughout its life cycle.

     

    HOMEPAGE – https://www.anonymz.com/?https://www.skillsoft.com/channel/certified-secure-software-lifecycle-professional-csslp-2f471dc1-2b74-11e7-bbbf-3b6e78cef3cf?certificationexam=47199

     

    Our Price: $2
  • Shop , Security & Hacking

    Deep Dive into Wireless Security

    This course is ideal for penetration testers, security enthusiasts and network administrators. It will take you on a unique journey starting from learning the core concepts of Wi-Fi technology to performing systematic penetration testing against Wi-Fi networks. Additionally, the course will help you grasp and apply the necessary skills and tools that you will need to hack Software Defined Radio. …

  • Shop , Security & Hacking

    Red Team Ops

    Red Team Ops is an online course that teaches the basic principals, tools and techniques, that are synonymous with red teaming.

    Students will first cover the core concepts of adversary simulation, command & control, and how to plan an engagement.  They will then learn about each stage of the attack lifecycle from initial compromise, to full domain takeover, data hunting, …

  • Shop , Security & Hacking

    SANS MGT551: Building and Leading Security Operations Centers (MP3-VID-LAB)

    Information technology is so tightly woven into the fabric of modern business that cyber risk has become business risk. SOC teams are facing more pressure than ever before to help manage this risk by identifying and responding to threats across a diverse set of infrastructures, business processes, and users. Furthermore, SOC managers are in the unique position of having to …