Showing 100–108 of 112 results

  • Security & Hacking , Shop

    Open-Source Intelligence (OSINT) Fundamentals


    This course focuses on Open Source Intelligence (OSINT) tactics and techniques designed to help you improve your investigative game. Students should take this course if they are interested in:

    • Gaining a better understanding of OSINT techniques
    • Improving investigative skillset
    • Improving overall research methodology

    What you’ll learn

    The following concepts will be taught in this …

  • Security & Hacking , Shop

    eLearnSecurity – Web Application Penetration Testing v3

    Course at a glance

    • Start from the very basics, all the way to advanced post-exploitation activities
    • Wide coverage of OWASP’s TOP 10
    • Master Burp Suite
    • In-depth Web application analysis, information gathering and enumeration
    • XSS & SQL Injection
    • Session related vulnerabilities
    • LFI/RFI
    • HTML5 attacks
    • Pentesting Content Management Systems (CMS)
    • Pentesting NoSQL databases and NoSQL-related APIs / NoSQL injections
    • Start from Web …
  • Security & Hacking , Shop

    eLearnSecurity – Practical Web Defense

    Course at a glance

    • Close the gap between Web application attack and defense
    • Mitigation advices for multiple platforms and languages
    • The most comprehensive and practical coverage of the OWASP Testing Guide
    • Comprehensively aligned to OWASP methodologies, tools and tests
    • Covers and goes beyond OWASP TOP 10
    • Detailed techniques and methodology to simplify defense of web applications
    • No boring theory: practice oriented curriculum
  • Security & Hacking , Shop

    eLearnSecurity – Exploit Development Student

    Course at a glance

    • Based on techniques professional exploit developers use
    • Thoroughly covers fundamental as well as advanced exploitation techniques
    • Software debugging
    • Shellcoding
    • Covers both Windows and Linux exploit development
    • Methodology on how to identify and fully exploit 0-day vulnerabilities
    • Covers bypassing modern anti-exploit mechanisms
    • Learn how to use tools like Immunity Debugger, x32dbg, Mona, Pwntools, GDB, Ropper, etc.
    • Extremely …
  • Security & Hacking , Shop

    [PentesterAcademy] Wi-Fi Monitoring for Red-Blue Teams

    This course focuses on the tools, techniques and procedures to monitor 802.11ac/n networks. We will be learning about both USB and Access Point hardware, pros and cons, and scalable architectures. We will be looking at different hardware for monitoring ranging in price from $40 to $350 and above, both USB and Access Point solutions.


    A non-exhaustive list of topics to be …

  • Security & Hacking , Shop

    Elearnsecurity – Penetration Testing eXtreme v2

    Course at a glance

    • Obscure ways of exploitation and backdooring
    • Advanced client side exploitation techniques
    • Custom attack vector and payload creation
    • In depth Active Directory Reconnaissance & Enumeration
    • In depth analysis of Active Directory exploitation
    • Stealthy lateral movement and evasion against modern defenses
    • In depth analysis of critical domain infrastructure exploitation
    • In depth details of common misconfigurations and weaknesses
    • Details …
  • Security & Hacking , Shop

    eLearnSecurity – Web Application Penetration Testing eXtreme v2

    Course at a glance

    • The most advanced course on Web App Pentesting
    • Based on techniques professional pentesters use
    • Master advanced Web Application attacks & security tools
    • In-depth Web Application Vulnerabilities analysis
    • Covers XSS, SQL Injection, HTML5 and much more
    • In-depth obfuscation and encoding techniques
    • Bypassing filters and WAF techniques included
    • Explore HTML5 and XML attacks vectors and exploits
    • Explore advanced …
  • Security & Hacking , Shop

    SANS SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques v2020

    SEC642 will teach you the advanced skills and techniques required to test modern web applications and next-generation technologies. In this course, you will learn through a combination of lectures, real-world experiences, and hands-on exercises that will teach you the techniques to test the security of tried-and-true internal enterprise web technologies, as well as cutting-edge Internet-facing applications. On the final day …

  • Security & Hacking , Shop

    eLearnSecurity – Penetration Testing Student v4

    Course at a glance

    • For absolute beginners in IT Security
    • Minimal pre-requisites
    • Learn about: Routing, Forwarding, and TCP/IP; Information Gathering; Scanning; Vulnerability Assessments; Buffer Overflows; XSS; SQL Injection; System and Network Attacks; and Basics of Web App Pentesting
    • Learn how to: Analyze Traffic with Wireshark, Exploit Vulnerable Hosts, Move Laterally, Manipulate Traffic, Crack Passwords, and Exfiltrate Data
    • Develop Pentesting tools …