Security , Shop
Ethical Hacking: Design Command and Control using Python 3
I will start at ground zero and show you how to design and build a fully featured command and control tool using Python 3. I will take the time to explain to you every bit of the code that I use to make this project happen. This is a project that I accomplished myself a couple of years ago, but …
Security , Shop
SANS SEC661: ARM Exploit Development (PDF-VID-LAB)
SEC661 is designed to break down the complexity of exploit development and the difficulties with analyzing software that runs on IoT devices. Students will learn how to interact with software running in ARM environments and write custom exploits against known IoT vulnerabilities.
HOMEPAGE – https://www.sans.org/webcasts/overview-sec661-arm-exploit-development-introduction-router-emulation/
Our Price: $25
Security , Shop
Learn Ethical Hacking Using The Cloud
Learn how to use the cloud for hacking. With NO prior knowledge required, this course takes you from a beginner to an expert at launching advanced attacks from the cloud. Giving you the ability to hack online accounts, web browsers, bypass two or multi factor authentication, and gain full remote control over all operating systems (Windows, Linux and Apple Mac OS) from within the cloud. That’s not all, you’ll …
Security , Shop
AWS Security Essentials
Get the best knowledge to secure your AWS environment. Learn efficient and effective practices for securing your AWS environment–set up encryption and implement mechanisms and advanced monitoring solutions for threat detection.
HOMEPAGE – https://www.pearsonitcertification.com/store/aws-security-essentials-video-course-9780135325391
Original Price: $240
Our Price: $6
Networking , Security
CCNP Security Core Technologies SCOR 350-701
This intermediate Cisco CCNP Security training covers the objectives in the 350-701 SCOR exam, which is the core exam for the CCNP Security certification.
Cisco’s 350-701 SCOR exam tests a broad skill set, including network, cloud, and content security; endpoint protection and detection; secure network access, visibility, and enforcement. Covering these core security technologies will provide you with the knowledge tested …
Networking , Security
Cisco CCNP Security SCOR (Exam 350-701)
Cisco CCNP Security SCOR course at ITProTV is ideal for any learner that wants to understand enterprise-level approaches to defense in depth security of systems and data. This course targets implementers and lead architects of security solutions with a bias toward the use of Cisco security hardware and software releases.
HOMEPAGE – https://www.itpro.tv/courses/cisco/cisco-ccnp-security-scor-exam-350701/
Our Price: $6
Security , Shop
Introduction Windows Malware Development
Are you ready to delve into the world of advanced Windows malware development? In this comprehensive course, we will take you on a journey through the intricate art of crafting malware for Windows systems. Whether you’re an aspiring red teamer, a seasoned malware developer, or simply curious about the dark side of cybersecurity, this course is designed to equip you …
Security , Shop
Investigating Windows Endpoints
Unlock the secrets of Windows forensic investigation with my new course!
Whether you’re looking to get into the field, already work in the field but want to step up your game, or just have an interest in digital forensics, look no further. This course is for you!
HOMEPAGE – https://training.13cubed.com/investigating-windows-endpoints
Original Price: $695
Our Price: $25
Programming , Security
Investigating Windows Memory
Learn the foundations of how Windows memory is structured, how to acquire memory, how to analyze memory images using Volatility, MemProcFS, and WinDbg, and more!Original Price: $795
Our Price: $25
Security
Showing 19–27 of 533 results