Showing 55–63 of 193 results

  • Security , Shop

    Recon and Vulnerability Detection

    Reconnaissance and vulnerability detection are foundational skills required for penetration testing, vulnerability assessments, and vulnerability management. These skills are the first steps of conducting a thorough and successful security assessment. In this Bootcamp, we will cover reconnaissance tools and techniques needed to enumerate and discover security vulnerabilities, including automated vulnerability scanners and manual techniques.

     

    HOMEPAGE – https://my.ine.com/bootcamps/93189fc0-c21b-4725-8667-e5d890b81a12

     

    Our Price: $5
  • Security , Shop

    Security Threats, Attacks, and Vulnerabilities

    This foundational security training prepares security technicians to recognize, compare, and contrast different types of cybersecurity vulnerabilities and threats and indicators associated with network attacks.

    Whether you’re on your way to earning your CompTIA Security+ certification, working toward a different cybersecurity cert, or just trying to expand your knowledge of digital network security, this training represents a crucial first …

  • Security , Shop

    Advanced Web Hacking – NotSoSecure

    This is our 5-day Advanced-level web application security testing course.

    Much like our popular Advanced Infrastructure Hacking class, this class talks about a wealth of hacking techniques to compromise web applications, APIs, cloud components and other associated end-points. This class focuses on specific areas of appsec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). The …

  • Security , Shop

    Learn Network Hacking From Scratch

    Do you want to learn network hacking? Do you want to secure your home or work network? How about launching a new career in the world of professional penetration testing or ethical hacking? If so, this is the course for you.

    Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous …

  • Security , Shop

    Hacker House – Hands-on Hacking

    Hacker House Hands-On Hacking course is an intensive introductory course that teaches applied hacking methodologies in a hands-on practical orientated approach. Our course is engineered from decades of experienced cyber security practitioner’s knowledge to educate students on common cyber security tasks. Our course is delivered by expert hackers to prepare students on adversarial thinking and equip them for tasks conducted …

  • Security , Shop

    The Complete Cybersecurity Bootcamp, 2nd Edition

    The Complete Cybersecurity Bootcamp, 2nd Edition is your comprehensive guide to becoming a cybersecurity professional. The extensive course is compiled from Omar Santo’s best-selling video courses, starting with the basics and leading you through the most important topics in the cybersecurity landscape. The videos in this intensive bootcamp are structured to help you start with the fundamental concepts of cybersecurity and …

  • Security , Shop

    Certified AWS Cloud Red Team Specialist [CARTS]

    AWS Cloud Red Team Course provides in-depth view of AWS core services, Identification of mis-configurations and stealthily abusing them in an Enterprise AWS Cloud Environment. As cloud shift is real, most of the Fortune 500 enterprises relies on AWS Cloud service provider for scaling their business overseas, with expansion comes huge responsibility of identifying and mitigating wide loopholes to secure cloud infrastructure.

     

    HOMEPAGE – …

  • Security , Shop

    Network Hacking Continued – Intermediate to Advanced

    Do you want to take your network hacking skills to the next level? how about building your own network hacking scripts?

    All the attacks in this course are practical attacks that work against real computers, in each technique you will understand the theory behind it and how it works, then you’ll learn how to use that technique in a real life …

  • Security , Shop

    Windows Process Injection for Red-Blue Teams

    In this course, we will understand the basics of Windows processes, virtual memory and different techniques to enumerate processes. Then we will look at the fundamentals of process injection and try out techniques like remote Thread Injection, APC, Thread Hijacking and Process Hollowing.

    This course is very practical with code examples to illustrate each technique!

     

    HOMEPAGE – https://www.anonymz.com/?https://www.pentesteracademy.com/course?id=50

     

    Our Price: $7