Showing 460–468 of 544 results

  • Security , Shop

    ITPRO.TV – Python for Security

    Python is a great language for learning, writing web applications, and manipulating data. However, Python can be used for security testing as well. In this series, we will explore the use of Python in such concepts as brute force password cracking, making SSH connections programmatically, creating socket connections and port scanner a particular host, banner grabbing from open ports, and …

  • Security , Shop

    CyberDefense Pro (2021)

    CyberDefense Pro helps you teach students how to monitor and respond to traffic both proactively and analytically, using hands-on labs that challenge with high-stake scenarios they’ll face on the job. It covers 60 of the most up-to-date tools, like Burp Suite, Wireshark, Metasploit, Ettercap, and Nmap, to learn job skills used by Incident Responders, Threat Intelligence Analysts, and Cybersecurity Analysts …

  • Security , Shop

    ITPRO.TV – Penetration Testing

    In this series, Daniel and Mike discuss, explain, and demonstrate some of the common tools and techniques used by Penetrations Testers during a security audit. Watch as they explore topics like hacking platforms and test environments, creating BIND/REVERSE shells, discovering and exploiting Buffer Overflows, Cross Site Scripting attacks, Local and Remote File Inclusion attacks, SQL-Injection, Password …

  • Security , Shop

    Cybercrime And You: Staying Safe in a Hyper-Connected World

    In our hyper-connected world, where instant communication between people, data and machines occurs over global, open networks, cybercrime has become an inescapable part of our daily lives.

    More and more people are increasingly reliant on online spaces to live, study, work, and entertainment and leisure. However, without the requisite cybersecurity infrastructure and knowledge as we learn and work from home, we …

  • Security , Shop

    Container Security

    Docker and Linux containers are changing the way applications are developed, tested and deployed. The Container Security Learning Path provides an overview of the key technologies used by Docker containers and how to utilize them for security. The learning path includes a review of Kubernetes, the most popular container orchestration system, focused on creating and running a secure cluster.

     

    HOMEPAGE – …

  • Security , Shop

    EC-Council – Open Source Intelligence

    If you have ever wondered how somebody is able to find that much information or data about you or your organization, then this is the course for you. Since Open-Source Intelligence is one of the most crucial phases in any cyberattack, you will find out what the bad guys can learn about you or your company. Information and data have …

  • Security , Shop

    Automated Mobile Application Security Assessment with MobSF

    Mobile Application market is growing like anything and so is the Mobile Security industry. With lots of frequent application releases and updates happening, conducting the complete security analysis of mobile applications becomes time consuming and cumbersome mainly because of the overheads in setting up and maintaining a mobile application testing environment. This course will introduce an extendable, and scalable web …

  • Security , Shop

    Node.js Security: Pentesting and Exploitation

    Node.js® is a platform built on Chrome’s JavaScript runtime for easily building fast, scalable network applications. This new technology is widely getting adopted in various organisations. Like any platform, Node.js has it’s on set of features that developers blindly use without much thought on security. The heart of Node is JavaScript, so it inherits most of the issues that are …

  • Security , Shop

    Securing Your Network from Attacks

    Attacks on enterprise networks and home networks are a growing problem with daily targeted attacks that can result in crippling results. These attacks have become more aggressive, sophisticated, and more dangerous over the years.
    This course is designed to give you the knowledge and skills to identify, mitigate, and prevent these attacks and help you secure your network. The course is …