Showing 505–513 of 533 results

  • Security , Shop

    Cross-Site Scripting (XSS) Training Course

    If you’ve only read about Cross-Site Scripting online, and you haven’t had the pleasure of working directly with attacks and exploits beyond launching an alert, then you’re absolutely just scratching the surface of all there is to learn.

    Most likely, you’ve been through some kind of basic training where you mostly just copied and pasted some generic code without much explanation.

    But …

  • Security , Shop

    eLearnSecurity – Practical Network Defense

    Course at a glance

    • Close the gap between Network attack and defense
    • Teaches defense which is valuable for both the defense team and offense team
    • Full practical setup guides
    • Configuration features to control, identify and prevent threats
    • Secure network design concepts and configuration of network appliances
    • 10 different lab scenarios to practice with
    • Configure secure remote access with practical examples
    • Windows configuration policies, …
  • Security , Shop

    eLearnSecurity – Incident Handling & Response Professional

    Course at a glance

    • Start from the very basics, all the way to advanced incident response activities
    • Professionally analyze, handle, and respond to security incidents on heterogeneous networks and assets
    • Understand the mechanics of modern cyber-attacks and how to detect them
    • Effectively use and fine-tune open source IDS (Bro, Snort, Suricata)
    • Make the best of open source SIEM solutions (ELK …
  • Security , Shop

    Certified Security Analyst Training – ECSA Certification Preparation

    The Certified Security Analyst Training course prepares students for gaining practical experience with conducting realistic penetration tests. Thought by top experts in the field, students learn advanced knowledge and experience regarding the available methodologies, tools and techniques which are required to perform comprehensive information security penetration tests.

    Students gain practical experience with the Licensed Penetration Tester in order to perform the …

  • Security , Shop

    Infosec4tc – CISSP® Exam Preparation Training Course

    CISSP® preparation training course focuses solely on the 8 domains of knowledge as determined by (ISC)2. Each domain of knowledge is dissected into its critical components, and those components are then discussed in terms of their relationship with one another and with other areas of information security.

    CISSP® preparation training course will guide you step by step on how to implement …

  • Security , Shop

    ECSAv10 e-Courseware

    The EC-Council Certified Security Analyst Certification is an advanced security certification that complements the Certified Ethical Hacker (CEH) certification by validating the analytical phase of ethical hacking. An ECSA is a step ahead of a CEH by being able to analyze the outcome of hacking tools and technologies.

    You are an ethical hacker. In fact, you are a Certified Ethical Hacker. …

  • Security , Shop

    Cybrary – Offensive Penetration Testing

    This is a deep course about penetration testing. In this course, you’ll learn from basic to the most advanced and modern techniques to find vulnerabilities through information gathering, create and/or use exploits and be able to escalate privileges in order to test your information systems defenses.

    By the end of this course, students should be able to:

    • Use passive and active …
  • Security , Shop

    RedTeamNation – RedTeam Blueprint

    The RedTeam Blueprint is our go to course for anyone ready to get into the field of Red Teaming, Penetration Testing and Ethical Hacking. We designed this course to be beginner friendly but also a challenge to others with experience. The RedTeam Blueprint is a course with over 30+ hours of content and hands on exercises.

    Upon completion of this course …

  • Security , Shop

    Facebook & Instagram Hacking course by DedSec

    Course Topic

    1. Hack facebook On Local Networks
    2. Facebook latest Bruteforce Method
    3. Hack Instagram using Fack page
    4. Hack Instagram using Fake followers Technique
    5. Crypter 888RAT Silent Exploit IE

    Requirements

    • Windows Operating System
    • Linux Any Distro
    • 2 GB RAM
    • Core I3-5 Processor
    • 80 GB HD
    • Ultra HD Videos
    • Skill level: Beginner Level

       

    HOMEPAGE – https://www.dedseec.com/product/facebook-and-instagram-hacking-course/

     

    Original Price: 2000
    Our Price: 370