Security , Shop
Red Team Ops
Red Team Ops is an online course that teaches the basic principals, tools and techniques, that are synonymous with red teaming.
Students will first cover the core concepts of adversary simulation, command & control, and how to plan an engagement. They will then learn about each stage of the attack lifecycle from initial compromise, to full domain takeover, data hunting, …
Security , Shop
Cracking Software Practicals (CSP)
Real software are commercial proprietary software. We are doing this for educational purposes and not to harm software developers. This skill and knowledge benefits developers in that they are better able to secure their software. The concept is similar to ethical hacking – the only way to defend against hackers is to know how hackers break in. Similarly, for software …
Networking , Shop
Cisco OSPF Troubleshooting Training
This intermediate Cisco OSPF Troubleshooting training prepares learners to identify the source of an OSPF error on a Cisco router and implement the appropriate steps to get your OSPF functionality restored.
The Open Shortest Path First protocol is a powerful and often complicated protocol. When it’s working properly, an autonomous system’s data can fly through its various nodes and routers. When …
Linux & IT , Programming
x86_64 Assembly Language and Shellcoding on Linux
This course focuses on teaching the basics of 64-bit assembly language for the x86_64 family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we will look at writing shellcode, encoders, decoders, crypters and other advanced low level applications.
HOMEPAGE – https://www.pentesteracademy.com/course?id=7
Our Price: $3
Security , Shop
Windows Red Team Lab
This is a companion course for our Windows Red Team Lab. It does however touch upon interesting concepts you can learn when doing pentests on a Windows Active Directory environment.
HOMEPAGE – https://www.pentesteracademy.com/course?id=44
Our Price: $3
Security , Shop
Exploiting Simple Buffer Overflows on Win32
In this course, we will look at how to exploit Simple Buffer Overflows on Win32 systems. This is an introductory course and starts from the very basics of exploitation and is beginner friendly. We will be taking over 10+ real world and staged application examples to illustrate the concepts. It is important to note that this introductory course will be …
Programming , Shop
HTML + CSS Basics – Ultimate Courses
Learn modern web fundamentals with the latest HTML5 and CSS3 techniques and practices. Fill all your knowledge gaps and build a real website from scratch.
HOMEPAGE – https://ultimatecourses.com/learn/html-css-basics
Original Price: $129
Our Price: $5
Programming , Security
Javascript for Pentesters
In this course, we will be learning how to use Javascript for Pentesting.
HOMEPAGE – https://www.pentesteracademy.com/course?id=11
Our Price: $3
Linux & IT , Security
Linux Forensics
This course will familiarize students with all aspects of Linux forensics. By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, analyze filesystems, analyze network traffic, analyze files, perform memory analysis, and analyze malware all on a Linux system with readily available free and open source tools. Students will …
Shop
Showing 703–711 of 1061 results