Showing 451–459 of 470 results

  • Security & Hacking , Shop

    SANS SEC508: Advanced Incident Response, Threat Hunting, and Digital Forensics

    Threat hunting and Incident response tactics and procedures have evolved rapidly over the past several years. Your team can no longer afford to use antiquated incident response and threat hunting techniques that fail to properly identify compromised systems. The key is to constantly look for attacks that get past security systems, and to catch intrusions in progress, rather than after …

  • Security & Hacking , Shop

    Reverse Engineering Course – The Hacks Behind Cracking By DedSec (In Hindi)

    Description:

    In this Reverse Engineering training course, expert  DedSec will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in RE.You will start by learning about reversing compiled Windows applications,Once you have completed this …

  • Business, Trading & Marketing , Shop

    The Facebook Ads Mastery

    Facebook Mastery is a world-class, easy to follow Facebook training program from a top-level advertiser. You will learn everything about running successful FB marketing campaigns from A-Z to help you not only get your first few sales, but create consistent sales that you can scale up to create financial freedom for yourself.

    Whether you’re a newbie or a seasoned pro, Facebook …

  • Security & Hacking , Shop

    SANS SEC564: Red Team Exercises and Adversary Emulation

    In SEC564, you will learn how to plan and execute an end-to-end adversary emulation, including how to plan and build a red team program, leverage threat intelligence to map against adversary tactic, techniques, and procedures (TTPs), emulate those TTPs, report and analyze the results of red team exercises, and ultimately improve the overall security posture of the organization.

    You …

  • Security & Hacking , Shop

    eLearnSecurity – Mobile Application Security and Penetration Testing v2

    Course at a glance

    • Start from iOS and Android architectures basics
    • Exposes Android and iOS vulnerabilities in-depth
    • Covers mobile OSs security mechanisms and implementations
    • Covers Mobile applications reverse engineering
    • In depth mobile applications static and dynamic analysis
    • Practice on real world mobile applications
    • Build your own home lab on mobile application security
    • Provides you the skills necessary to peform Penetration tests of mobile applications
    • Covers: APKTool, …
  • Security & Hacking , Shop

    Open-Source Intelligence (OSINT) Fundamentals

    Description

    This course focuses on Open Source Intelligence (OSINT) tactics and techniques designed to help you improve your investigative game. Students should take this course if they are interested in:

    • Gaining a better understanding of OSINT techniques
    • Improving investigative skillset
    • Improving overall research methodology

       

      HOMEPAGE – https://academy.tcm-sec.com/p/osint-fundamentals

       

      Original Price: $30
      Our Price: $4.99
    • Security & Hacking , Shop

      eLearnSecurity – Web Application Penetration Testing v3

      Course at a glance

      • Start from the very basics, all the way to advanced post-exploitation activities
      • Wide coverage of OWASP’s TOP 10
      • Master Burp Suite
      • In-depth Web application analysis, information gathering and enumeration
      • XSS & SQL Injection
      • Session related vulnerabilities
      • LFI/RFI
      • HTML5 attacks
      • Pentesting Content Management Systems (CMS)
      • Pentesting NoSQL databases and NoSQL-related APIs / NoSQL injections
      • Start from Web …
    • Security & Hacking , Shop

      eLearnSecurity – Practical Web Defense

      Course at a glance

      • Close the gap between Web application attack and defense
      • Mitigation advices for multiple platforms and languages
      • The most comprehensive and practical coverage of the OWASP Testing Guide
      • Comprehensively aligned to OWASP methodologies, tools and tests
      • Covers and goes beyond OWASP TOP 10
      • Detailed techniques and methodology to simplify defense of web applications
      • No boring theory: practice oriented curriculum
    • Security & Hacking , Shop

      eLearnSecurity – Exploit Development Student

      Course at a glance

      • Based on techniques professional exploit developers use
      • Thoroughly covers fundamental as well as advanced exploitation techniques
      • Software debugging
      • Shellcoding
      • Covers both Windows and Linux exploit development
      • Methodology on how to identify and fully exploit 0-day vulnerabilities
      • Covers bypassing modern anti-exploit mechanisms
      • Learn how to use tools like Immunity Debugger, x32dbg, Mona, Pwntools, GDB, Ropper, etc.
      • Extremely …