Showing 118–126 of 193 results

  • Security , Shop

    Movement, Pivoting, and Persistence

    Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers is the next step in YOUR penetration testing and ethical hacking journey.

    Most engagements are conducted remotely, meaning that the tester must have the ability to move about freely from outside of the network into it. We do this using various techniques. Some of the simplest can be utilizing a compromised password to access a …

  • Security , Shop

    Web Security & Bug Bounty: Learn Penetration Testing in 2021

    Start a career or earn a side income by becoming a Bug Bounty Hunter. No experience needed. Hack websites, fix vulnerabilities, improve web security and much more. You’ll learn penetration testing from scratch and master the most modern pentesting tools & best practices for 2021!

     

    HOMEPAGE – https://www.anonymz.com/?https://academy.zerotomastery.io/p/learn-penetration-testing

     

    Our Price: $6.99
  • Security , Shop

    Practical Phishing Assessments

    Practical Phishing Assessments teaches everything you need to know about setting up a professional phishing campaign to bypass multi-factor authentication, spam filters, and capture credentials! This course was created for those wanting to learn how a phishing campaign is conducted in real life penetration test engagements.

    The course is short, sweet, and packed full of hands on content, including 100% practical …

  • Security , Shop

    Cybrary – Advanced Penetration Testing

    The Advanced Penetration Testing course teaches the cyber attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection.

     

    HOMEPAGE – https://www.anonymz.com/?https://www.cybrary.it/course/advanced-penetration-testing/

     

    Our Price: $4.99
  • Security , Shop

    Infosec4TC – Ethical Hacking in Offensive Way : Core Ethical Hacking Kit

    Start Breaking Real Machines from Lecture 4
    This is an Exclusive Course by Proficient School and our Instructor has requested not to reveal his identity.

    The Course is Truly for anyone who is a Total Beginner in this Field to Even People with 5+ Years Experience, We created the First One of it’s kind Course by Getting you Break Real Machines when …

  • Security , Shop

    RED TEAM Operator: Windows Evasion Course (VID-LAB)

    In the modern enterprise Windows  environment we often encounter lots of obstacles, which try to detect and stop our sneaky tools and techniques. Endpoint protection agents (AV, IDS/IPS, EDR, etc.) are getting better and better at this, so this requires an extended effort in finding a way into the system and staying undetected during post-exploitation activities.

    This course will guide you …

  • Security , Shop

    Cybrary – CompTIA Security+ (SY0-601)

    Cybersecurity is a rising career field with a need for more security professionals in all industries and types of organizations. One of the greatest hindrances to mitigating cybercrime is the lack of qualified and skilled professionals trained in cybersecurity.

     

    HOMEPAGE – https://www.anonymz.com/…comptia-security-plus/

     

    Our Price: $5
  • Security , Shop

    CyberDefense Pro (2021)

    CyberDefense Pro helps you teach students how to monitor and respond to traffic both proactively and analytically, using hands-on labs that challenge with high-stake scenarios they’ll face on the job. It covers 60 of the most up-to-date tools, like Burp Suite, Wireshark, Metasploit, Ettercap, and Nmap, to learn job skills used by Incident Responders, Threat Intelligence Analysts, and Cybersecurity Analysts …

  • Security , Shop

    ITPRO.TV – Penetration Testing

    In this series, Daniel and Mike discuss, explain, and demonstrate some of the common tools and techniques used by Penetrations Testers during a security audit. Watch as they explore topics like hacking platforms and test environments, creating BIND/REVERSE shells, discovering and exploiting Buffer Overflows, Cross Site Scripting attacks, Local and Remote File Inclusion attacks, SQL-Injection, Password …