-
Shop , Security & Hacking
Network Hacking Continued – Intermediate to Advanced
Do you want to take your network hacking skills to the next level? how about building your own network hacking scripts?
All the attacks in this course are practical attacks that work against real computers, in each technique you will understand the theory behind it and how it works, then you’ll learn how to use that technique in a real life …
-
Shop , Security & Hacking
Windows Process Injection for Red-Blue Teams
In this course, we will understand the basics of Windows processes, virtual memory and different techniques to enumerate processes. Then we will look at the fundamentals of process injection and try out techniques like remote Thread Injection, APC, Thread Hijacking and Process Hollowing.
This course is very practical with code examples to illustrate each technique!
HOMEPAGE – https://www.anonymz.com/?https://www.pentesteracademy.com/course?id=50
Our Price: $7
-
Shop , Security & Hacking
Cryptography: A Hands-on Approach
Cryptography is a foundation in cybersecurity. It is the underlying building block of many defense mechanisms, systems, and protocols. Without crypto, we will not be able to safely conduct many things on the Internet, such as web browsing, online banking, working remotely, etc. Without crypto, blockchain and cryptocurrency will not exist.
In this course, we systematically study the basic principles of …
-
Shop , Security & Hacking
Case Studies of Award-Winning XSS Attacks: Part 2
This course is the follow-up to one of my previous courses – “Case-Studies of Award-Winning XSS Attacks: Part 1”. We will continue our XSS hunting journey and you will learn more about award-winning XSS attacks.
There are many people hunting for XSSs, but only a few of them are successful and earn a 4-digit ($$$$) reward per single XSS. What makes …
-
Shop , Security & Hacking
Certified Incident Handler (ECIH) v2
This course covers the exam objectives of EC-Council’s Certified Incident Handler v2 (E|CIH) program. It discusses the basic skills to handle and respond to security events and addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The incident handling skills taught in E|CIH are complementary to the job roles below as well …
-
Shop , Security & Hacking
CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL (CSSLP)
Prepare for the CSSLP certification by acquiring the knowledge to create and maintain secure software throughout its life cycle.
HOMEPAGE – https://www.anonymz.com/?https://www.skillsoft.com/channel/certified-secure-software-lifecycle-professional-csslp-2f471dc1-2b74-11e7-bbbf-3b6e78cef3cf?certificationexam=47199
Our Price: $2
-
Shop , Security & Hacking
Deep Dive into Wireless Security
This course is ideal for penetration testers, security enthusiasts and network administrators. It will take you on a unique journey starting from learning the core concepts of Wi-Fi technology to performing systematic penetration testing against Wi-Fi networks. Additionally, the course will help you grasp and apply the necessary skills and tools that you will need to hack Software Defined Radio. …
-
Shop , Security & Hacking
Red Team Ops
Red Team Ops is an online course that teaches the basic principals, tools and techniques, that are synonymous with red teaming.
Students will first cover the core concepts of adversary simulation, command & control, and how to plan an engagement. They will then learn about each stage of the attack lifecycle from initial compromise, to full domain takeover, data hunting, …
-
Shop , Security & Hacking
SANS MGT551: Building and Leading Security Operations Centers (MP3-VID-LAB)
Information technology is so tightly woven into the fabric of modern business that cyber risk has become business risk. SOC teams are facing more pressure than ever before to help manage this risk by identifying and responding to threats across a diverse set of infrastructures, business processes, and users. Furthermore, SOC managers are in the unique position of having to …
Security & Hacking
Showing 1–9 of 248 results