Showing 172–180 of 193 results

  • Security , Shop

    ECSAv10 e-Courseware

    The EC-Council Certified Security Analyst Certification is an advanced security certification that complements the Certified Ethical Hacker (CEH) certification by validating the analytical phase of ethical hacking. An ECSA is a step ahead of a CEH by being able to analyze the outcome of hacking tools and technologies.

    You are an ethical hacker. In fact, you are a Certified Ethical Hacker. …

  • Security , Shop

    Cybrary – Offensive Penetration Testing

    This is a deep course about penetration testing. In this course, you’ll learn from basic to the most advanced and modern techniques to find vulnerabilities through information gathering, create and/or use exploits and be able to escalate privileges in order to test your information systems defenses.

    By the end of this course, students should be able to:

    • Use passive and active …
  • Security , Shop

    RedTeamNation – RedTeam Blueprint

    The RedTeam Blueprint is our go to course for anyone ready to get into the field of Red Teaming, Penetration Testing and Ethical Hacking. We designed this course to be beginner friendly but also a challenge to others with experience. The RedTeam Blueprint is a course with over 30+ hours of content and hands on exercises.

    Upon completion of this course …

  • Security , Shop

    Facebook & Instagram Hacking course by DedSec

    Course Topic

    1. Hack facebook On Local Networks
    2. Facebook latest Bruteforce Method
    3. Hack Instagram using Fack page
    4. Hack Instagram using Fake followers Technique
    5. Crypter 888RAT Silent Exploit IE

    Requirements

    • Windows Operating System
    • Linux Any Distro
    • 2 GB RAM
    • Core I3-5 Processor
    • 80 GB HD
    • Ultra HD Videos
    • Skill level: Beginner Level

       

    HOMEPAGE – https://www.dedseec.com/product/facebook-and-instagram-hacking-course/

     

    Original Price: 2000
    Our Price: 370
  • Security , Shop

    Learn Ethical Hacking By Hacking Real Websites Legally

    If you want to learn ethical hacking the fun and easy way like playing a computer game, then this course is for you. There exists on the Internet several websites which allows people to hack and learn hacking.  These websites typically have different levels from easy to advanced. By hacking each level and gradually levelling up, you will learn hacking.  Traditionally, …

  • Security , Shop

    Bug Bounty Master Class

    Bug bounty programs are moving from the realm of novelty towards becoming best practice.They provide an opportunity to level the cyber security playing field, strengthening the security of products as well as cultivating a mutually rewarding relationship with the security researcher community. While bug bounty programs have been used for over 20 years, widespread adoption by enterprise organizations has just …

  • Security , Shop

    Learn Kali Linux and hack any Android Mobile device

    Most of today Ethical Hacking and Penetration testing courses are focusing on how to compromise computers with Windows and Linux platform while right now most peoples are keeping all their critical data (Emails, Contacts, SMS, Personnel files) on Smart phones and tablet that use different platform like Android and doesn’t have the same layers of security like PC’s and accordingly …

  • Security , Shop

    Practical Threat Hunting

    Practical Threat Hunting is a foundational course that will teach you how to approach threat hunting using a proven, structured, repeatable framework. I created this course to help people figure out what to hunt for, where to find it, and how to look for it.

    Practical Threat Hunting is the course that will teach you to hunt in a way that will never …

  • Security , Shop

    eLearnSecurity – Threat Hunting Professional v2

    Course at a glance

    • Establish a proactive defense mentality
    • Hunt for threats in your organization’s systems and network
    • Use threat intelligence or hypotheses to hunt for known and unknown threats
    • Inspect network traffic and identify abnormal activity in it
    • Perform memory forensics using Redline, Volatility and a variety of tools to identify in-memory malware
    • Use tools such as Sysmon and …