Showing 19–27 of 112 results

  • Shop , Programming & Designing

    Coursera.org – Secure Coding Practices Specialization

    This Specialization is intended for software developers of any level who are not yet fluent with secure coding and programming techniques.Through four courses, you will cover the principles of secure coding, concepts of threat modeling and cryptography and exploit vulnerabilities in both C/C++ and Java languages, which will prepare you to think like a hacker and protect your organizations information. …

  • Shop , Security & Hacking

    Pentester Academy – Android Security and Exploitation for Pentesters

    Android Security and Exploitation for Pentesters is a course intended for people who want to get started into Android Security, or even who are a bit familiar with the Android security space but want to learn more about Android Application Security. This is a hands-on course where you will get to reverse applications, find security vulnerabilities, perform debugging and API …

  • Shop , Security & Hacking

    Pentester Academy – Windows Forensics

    This course will familiarize students with all aspects of Windows forensics.By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, analyze filesystems, analyze network traffic, analyze files, perform memory analysis, and analyze malware for a Windows subject on a Linux system with readily available free and open source tools.  Students will also …

  • Shop , Security & Hacking

    Pentester Academy – Make your own Hacker Gadget

    All of us have heard about or used Hacker Gadgets like the WiFi Pineapple, Minipwner, Pwn Plug, R00tabaga etc. They are fantastic to use for demos, in social engineering tasks, explaining security implications in a fun way to non security professionals and in actual pentest task automation! but what does it take to build one? In this course, we will …

  • Shop , Security & Hacking

    Pentester Academy – USB Forensics and Pentesting

    This course will cover USB in detail with an emphasis on understanding USB Mass Storage devices (also known as flash drives or thumb drives).By the end of this course students will know how to sniff USB traffic using open source tools, be able to write-block USB mass storage devices using software and microcontroller-based hardware, be able to impersonate other USB …

  • Shop , Security & Hacking

    Pentester Academy – Web Application Pentesting

    A beginner friendly introduction to Web Application Security with starts from the very basics of the HTTP protocol and then takes on more advanced topics.

    web application penetration test is a type of ethical hacking engagement designed to assess the architecture, design and configuration of web applications. Assessments are conducted to identify cyber security risks that could lead to unauthorised access and/or data …

  • Shop , Security & Hacking

    Become an AWS Certified Solutions Architect – Associate

    This certification path teaches you all you need to get started using Amazon Web Services (AWS), including the AWS Management Console, S3 buckets, EC2 instances, database services, security in the cloud and the costs associated with AWS. The first two courses cover the essentials of AWS. The remaining 16 courses build your knowledge and skills around the five domain areas …

  • Shop , Security & Hacking

    Become a Certified Information Systems Security Professional (CISSP)

    This learning path prepares you to pass the prestigious Certified Information Systems Security Professional (CISSP) exam. As you progress through 24 courses, you’ll build your knowledge across a broad range of technical and management topics ranging from secure software development and cryptography to security governance and risk management. Upon completion you’ll be prepared to earn your CISSP, one of …

  • Shop , Security & Hacking

    Cybrary – Metasploit

    Take an in-depth look at the Metasploit Framework so that you can be confident that you are using this tool to its fullest capabilities. Metasploit’s capabilities are wide, and this class will help you to prepare to run vulnerability assessments for organizations of any size. Here is what the class will cover: Fundamentals about the framework Framework organization How to install it …