Showing 91–99 of 193 results

  • Security , Shop

    Android & Mobile App Pentesting

    In this course you will be shown how to perform professional penetration testing activities against Android and iOS mobile applications, by means of reverse engineering, static analysis and dynamic analysis. First you will learn all about the attack surface of Android applications and the techniques to exploit each covered vulnerability (incl. reverse engineering). Specifically, Android OS fundamentals (Android VM, Android …

  • Security , Shop

    HackerOps – Antisyphon Training

    To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement, the more time we need. Time is something we don’t have a lot of on an engagement.

    Today, to be …

  • Security , Shop

    Mobile Application Penetration Testing

    Mobile Application Penetration Testing

    This course focuses on Android and iOS Mobile Application Penetration testing. The course will demonstrate common techniques to extract sensitive data from Android and iOS Application such as API Keys, stored secrets, and firebase databases, and provide a solid foundation for continuing a career as a Mobile Application Penetration Tester. This course will cover the common methodologies …

  • Security , Shop

    Certified Ethical Hacker (CEH) v11

    The Certified Ethical Hacker(CEH) v11 course is designed to give the student a foundational knowledge-base and skillset to be an asset to their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing and vulnerability assessments.

     

    HOMEPAGE – https://www.anonymz.com/?https://www.itpro.tv/courses/security-skills/certified-ethical-hacker-v11/

     

    Our Price: $7
  • Security , Shop

    Practical Malware Analysis & Triage

    Arm yourself with knowledge and bring the fight to the bad guys! Practical Malware Analysis & Triage (PMAT) brings the state of the art of malware analysis to you in engaging instructional videos and custom made, practical labs.

    Welcome to Practical Malware Analysis & Triage. I’m Matt, aka HuskyHacks, and I’m excited to be your instructor for this course. I had …

  • Security , Shop

    Hands-on Hacking

    To become a well-rounded Ethical Hacker and/or Penetration Tester, not only must you be familiar with the appropriate tools and techniques, but you must also craft your methodology for applying said skills. One of the best ways of accomplishing that goal is by way of practical application. In this series, you’ll be instructed on how to apply your hacking skills …

  • Security , Shop

    FortyNorth – Initial Access Operations

    One of the most critical aspects of any red team assessment is obtaining initial access into your target’s environment. The ability to capture valid credentials or execute code within your target’s environment is the first step toward accomplishing the rest of your assessment goals.

    In this course,students will learn a variety of techniques used by attackers to phish companies …

  • Security , Shop

    FortyNorth – Intrusion Operations 2021

    Intrusion operations is our advanced Red Team training course. Modern day attackers are relentlessly developing new tradecraft and methodologies that allow them to successfully compromise hardened targets for a variety of motivations. While it may look easy from the outside, there are many latent steps that attackers take to ensure their success. Our job as red teamers is emulate this attack …

  • Security , Shop

    Pentester Academy – Web Application Security Bootcamp

    A beginner-friendly introduction to the Open Web Application Security Project® (OWASP) Top 10 vulnerabilities, where you will build a solid foundation in pentesting modern web applications with different attack tools.

    Web application security is as old as the web. However, today, almost all WebApps have transitioned into the cloud. This bootcamp lets you practice attacks on real-world web applications and teaches …