Showing 1–9 of 533 results

  • Security , Shop

    OFFENSIVE MOBILE REVERSING AND EXPLOITATION

    This is a completely hands-on course designed for beginners and intermediate students. Instead of just slides, attendees will get a chance to exploit all of the vulnerabilities taught by the instructors.

     

    HOMEPAGE – https://sectrain.hitb.org/courses/offensive-mobile-reversing-and-exploitation-hitb2023ams/

     

    Original Price: $4,299
    Our Price: $25
  • Security , Shop

    Certified Ethical Hacker Elite

    You will understand how to use open-source intelligence to your advantage. Further, you will discover how to analyze and interpret network protocols and leverage Wireshark. Moving ahead, you will learn how to perform ethical hacking using Nmap. You will also learn how to perform information gathering and enumeration of Windows-specific services with Nmap and OpenVAS. You will then understand how …

  • Security , Shop

    Offensive Development Training Course

    White Knight Labs proudly presents “Offensive Development,” an intermediate-level course meticulously crafted for cybersecurity professionals. This program is not for beginners; it’s tailored for those looking to elevate their skills in the complex art of offensive cybersecurity.

     

    HOMEPAGE – https://training.whiteknightlabs.com/offensive-development-training/

     

    Original Price: $1,100
    Our Price: $20
  • Security , Shop

    Malware On Steroids

    The Malware On Steroids is the first course which is dedicated to building your own C2 Infrastructure and Payload. There are a lot of courses which focus on exploitation, reversing and other offensive stuff, but none of them focus on how you can build your own Command & Control Infra. This course focuses on a brief introduction towards Windows Internals …

  • Security , Shop

    EC-Council Certified DevSecOps Engineer (ECDE)

    EC-Council Certified DevSecOps Engineer (ECDE) is a hands-on, instructor-led comprehensive DevSecOps certification program which helps professionals to build essential knowledge and abilities in designing, developing, maintaining a secure applications and infrastructure.

    • This course is blended with both theoretical knowledge as well as the practical implementation of DevSecOps in your on-prem and cloud-native (AWS and Azure) environment
    • The course covers …
  • Security , Shop

    Ransomware Attack Simulation and Investigation for Blue Teamers

    As a cyber security defender and investigator, we often just get to analyze an environment that suffered a ransomware attack after the ransomware execution, where we are trying to make our way back in time to understand the scope and initial infection vectors of a breach. However, knowing how attackers operate and having an understanding of their tools can help …

  • Security , Shop

    SANS LDR520: Cloud Security for Leaders (PDF-VID)

    This cloud security strategy for leaders training course focuses on what managers, directors, and security leaders need to know about developing their plan/roadmap while managing cloud security implementation capabilities. To safeguard the organization’s cloud environment and investments, a knowledgeable management team must engage in thorough planning and governance. We emphasize the essential knowledge needed to develop a cloud security roadmap …

  • Security , Shop

    AI Security and Responsible AI Practices

    Get the essential skills to protect your AI system against cyber attacks. Explore how generative AI and LLMs can be harnessed to secure your projects and organizations against AI cyber threats. Develop secure and ethical systems while being mindful of privacy concerns with real-life examples that we use on a daily-basis with ChatGPT, GitHub Co-pilot, DALL-E, Midjourney, DreamStudio (Stable Diffusion), …

  • Security , Shop

    SANS LDR516: Building and Leading Vulnerability Management Programs (PDF-VID)

    Vulnerability, patch, and configuration management are not new security topics. In fact, they are some of the oldest security functions. Yet, we still struggle to manage these capabilities effectively. The quantity of outstanding vulnerabilities for most large organizations is overwhelming, and all organizations struggle to keep up with the never-ending onslaught of new vulnerabilities in their infrastructure and applications. When …