Showing 46–54 of 193 results

  • Security , Shop

    Red Team: Getting Access w/ Michael Allen (PDF-VID-LAB)

    Getting a foothold is the first step in a successful breach—be it in the form of user credentials, email access, or code execution on a target system. This course will provide students with the fundamental skills and know-how to perform the most common attacks used to get an initial foothold during a red team exercise.

    Since Microsoft products and services are …

  • Security , Shop

    Hands-On Web App Pentesting

    EPISODES

    • WEB BASICS
      • Overview
      • URLs
      • HTTP Methods
      • Web App Infrastructure
      • Web APIs
      • Content Management Systems
      • Databases
    • COMMON TOOLS
      • Web Browser
      • Burp Suite
      • <li role="button" ...
  • Security , Shop

    EC-Council Certified Incident Handler v2 (PDF-VID)

    This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe.

    It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post breach consequences by reducing the impact of the incident, from both a financial and a …

  • Security , Shop

    Adversary Simulation and Red Team Tactics

    This intense course covers the skills required to conduct a simulation of a sophisticated adversary, including the latest tradecraft and offensive tactics. During the training you will gain insight in to planning and conducting a red team operation including all the steps required to perform efficient opensource intelligence, design and automate the deployment of operational infrastructure, gain initial access and …

  • Security , Shop

    Web Hacking Secrets: How To Hack Legally And Earn Thousands Of Dollars At HackerOne

    HackerOne is your big opportunity. This is the platform where you can hack legally and at the same time you can make money. You can hack many different companies like Twitter, Yahoo, Uber, Coinbase, and a lot more. And you can get paid for your findings, for example $100, $1,000, or even $10,000 per one bug. It’s just amazing. All you need is …

  • Security , Shop

    Certified Malicious Software Analyst

    Learn how to analyze malware using tools for Dynamic and Static analysis. Understand how to use IDA Pro Disassembler and Immunity Debugger, how to intercept process injection, how to add network detection with Snort or at binary-level with Yara.

    As a Reverse Engineer you need to know how to dump process from memory and reconstruct them to run them in a …

  • Security , Shop

    Wi-Fi Security and Pentesting

    This course is ideal for penetration testers, security enthusiasts and network administrators.
    A non-exhaustive list of topics to be taught includes:

    • Bypassing WLAN Authentication – Shared Key, MAC Filtering, Hidden SSIDs
    • Cracking WLAN Encryption – WEP, WPA/WPA2 Personal and Enterprise, Understanding encryption based flaws (WEP,TKIP,CCMP)
    • Attacking the WLAN Infrastructure – Rogues Devices, Evil Twins, DoS Attacks, MITM, Wi-Fi Protected Setup
  • Security , Shop

    Advanced Recon And Ethical Hacking By James Beers

    This course will teach you everything I know so far about recon. In this course, we will be turning you into a self-sufficient hacker that can carve his own path!

     

    HOMEPAGE – https://thexssrat.podia.com/advanced-recon-and-ethical-hacking-by-james-beers

     

    Original Price: $39.99
    Our Price: $7
  • Security , Shop

    Penetration Testing Tools

    This intermediate Penetration Testing Tools training prepares learners to recognize when to use different tools and software to round out their penetration testing repertoire and provide an understanding of a target’s vulnerabilities.

     

    HOMEPAGE – https://www.cbtnuggets.com/it-training/cyber-security/penetration-testing-tools

     

    Our Price: $4