Showing 136–144 of 193 results

  • Security , Shop

    Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series)

    Enterprise Penetration Testing and Continuous Monitoring LiveLessons, part of The Art of Hacking video series, provides step-by-step, real-life complex scenarios of performing security assessments (penetration testing) of enterprise networks using internal/external reconnaissance, social engineering, and network and vulnerability scanning. You also learn how to perform web app testing, internal network testing, privilege escalation, password cracking, and data exfiltration to probe …

  • Security , Shop

    Certified Penetration Testing Engineer (CPTE)

    This Official Mile2® cyber security certification training series covers everything you need to know about becoming a Certified Penetration Testing Engineer. Students will learn about logistics of pen testing, Linux fundamentals, information gathering, detecting live systems, enumeration, vulnerability assessments, malware going undercover, Windows hacking, hacking UNIX/Linux, advanced exploitation techniques, pen testing wireless networks, networks, sniffing and IDS, injecting the database, …

  • Security , Shop

    EC-Council – Certified Penetration Testing Professional | CPENT (PDF-Videos)

    EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT …

  • Security , Shop

    InfosecInstitute.com – Become a Certified Ethical Hacker (CEH)

    This learning path teaches you the hacking skills and methodology needed to perform a penetration test against an organization. You’ll learn the foundations of ethical hacking and penetration testing as you progress through 12 courses tied to the seven Certified Ethical Hacker (CEH) exam objectives. Upon completion you’ll be prepared to earn your CEH certification and have an established base …

  • Security , Shop

    ACloudGuru.com – Certified Ethical Hacker (CEH) – Linux Academy’s Prep Course

    Have you always wanted to learn how to discover the weaknesses and vulnerabilities of a system? Have you always wondered how security professionals protect their systems from intruders? Do you wish to master hacking technologies? If so, then this course is for you.

    If you wish to learn how you can improve the security of any system, or even if you …

  • Security , Shop

    Reversing Hero

    ReversingHero is a Reverse Engineering self learning kit (x86_64 on linux) wrapped inside one binary file. It is made of 15 levels, with difficulty gradually increasing.

    This course contains step by step hints and solution videos for solving ReversingHero. To get the most of this course, you should try solving each level yourself, and watch the corresponding video only if you …

  • Security , Shop

    Practical Hacking Master Class

    The Authors of this course or Any Party Related to this Course or Authors will not be Responsible for any Damages done by you to anyone in any way after taking this course, We Intend to Make a Better Cyber World by Teaching Every Little Practical Thing, and We Motivate you to use this Knowledge For Good Purposes.

     

    HOMEPAGE – <a ...

  • Security , Shop

    Bitdegree.org – Hacking Masterclass Ethical Hacking Course for Career Accelerator

    A lot of people get suspicious when they hear the term hacking. They associate it with criminal activity, harmful attacks, and stolen data leaks. They’re not wrong… To a certain degree.

    There are actually three types of hackers, commonly known as black hat, grey hat, and white hat. The kind described above wears the darkest one, of course. A grey hat hacker …

  • Security , Shop

    Pentester Academy – Make your own Hacker Gadget

    All of us have heard about or used Hacker Gadgets like the WiFi Pineapple, Minipwner, Pwn Plug, R00tabaga etc. They are fantastic to use for demos, in social engineering tasks, explaining security implications in a fun way to non security professionals and in actual pentest task automation! but what does it take to build one? In this course, we will …