Showing 10–18 of 120 results

  • Shop , Security & Hacking

    Learn Computer Forensics

    This learning path is designed to build a foundation of knowledge and skills around computer forensics. As you progress through 13 courses, you’ll learn about conducting forensics on a variety of platforms and devices, including networks, file and operating systems, memory, email and browsers. Upon completion, you’ll have a base of computer forensics knowledge to carry over to your job …

  • Shop , Security & Hacking

    Don’s Introduction to Ethical Hacking for Beginners

    Don here and I work as a penetration tester / ethical hacking. A LOT of people interested in jumping into my world ask me “Where do I even start?”

    So I’ve built a hands-on practical subject to address this question. Exploitation, Website hacking, SQLi, XSS, Buffer Overflow, Metasploit, Privilege Escalation & More.

    Worried about the pre-requisites? Don’t be! I’ve assumed a ground-zero no knowledge approach to …

  • Shop , Security & Hacking

    Complete Ethical Hacking Bootcamp 2021: Zero to Mastery

    Whether you are a complete beginner looking to become an ethical hacker, or you’re a student looking to learn about securing computer systems, or you are a programmer who is looking to improve their security online and prevent attacks from hackers on your website, this course will dive you into the world of hacking and penetration testing. We even teach you …

  • Shop , Security & Hacking

    Linux Academy – Certified Ethical Hacker (CEH) – Linux Academy’s Prep Course

    Have you always wanted to learn how to discover weaknesses and vulnerabilities of a system? Have you always wondered how security professionals protect their systems from intruders? Do you wish to master hacking technologies? If so, then this exam is for you.

    If you wish to learn how you can improve the security of any system, or even if you have …

  • Shop , Security & Hacking

    InfosecInstitute.com – Become a Certified Ethical Hacker (CEH)

    This learning path teaches you the hacking skills and methodology needed to perform a penetration test against an organization. You’ll learn the foundations of ethical hacking and penetration testing as you progress through 12 courses tied to the seven Certified Ethical Hacker (CEH) exam objectives. Upon completion you’ll be prepared to earn your CEH certification and have an established base …

  • Shop , Security & Hacking

    ACloudGuru.com – Certified Ethical Hacker (CEH) – Linux Academy’s Prep Course

    Have you always wanted to learn how to discover the weaknesses and vulnerabilities of a system? Have you always wondered how security professionals protect their systems from intruders? Do you wish to master hacking technologies? If so, then this course is for you.

    If you wish to learn how you can improve the security of any system, or even if you …

  • Shop , Security & Hacking

    EC-Council Certified Encryption Specialist

    This course is an introduction to cryptography, it’s history, application, and all that is needed to pass the Certified Encryption Specialist certification exam.Topics include the history and application of cryptography and symmetric cryptography and hashes.

     

    HOMEPAGE – https://www.itpro.tv/courses/security-skills/eces/

     

    Our Price: $3.99
  • Shop , Security & Hacking

    Reversing Hero

    ReversingHero is a Reverse Engineering self learning kit (x86_64 on linux) wrapped inside one binary file. It is made of 15 levels, with difficulty gradually increasing.

    This course contains step by step hints and solution videos for solving ReversingHero. To get the most of this course, you should try solving each level yourself, and watch the corresponding video only if you …

  • Shop , Security & Hacking

    Cybrary – Certified Information System Auditor (CISA)

    For Cyber Security professionals who are interested in the field of audit, the Certified Information Systems Auditor (CISA) certification by ISACA is the leading credential to achieve. In order to face the dynamic requirements of meeting enterprise vulnerability management challenges, this course covers the information systems auditing control processes to ensure that you have the ability to analyze the state …