Udemy – Advanced White Hat Hacking & Penetration Testing Tutorial By Infinite Skills

Udemy – Advanced White Hat Hacking & Penetration Testing Tutorial By Infinite Skills
English | Size: 615.49 MB
Category: CBTs

In this Advanced White Hat Hacking And Penetration Testing training course, Infinite Skills takes you beyond the basics of Ethical Hacking and shows you advanced techniques for discovering potential security problems with your websites and networks. This course requires that you already have familiarity with the basics of penetration testing, and assumes that you have already completed the Learning White Hat Hacking And Penetration Testing course from Infinite Skills. [Read more…]

Pluralsight – Exploit Development and Executon with Metasploit

Pluralsight – Exploit Development and Executon with Metasploit
English | Size: 672.87 MB
Category: CBTS

As a security professional learning the ins and outs of exploitation can be challenging. In this course, Exploit Development and Execution with the Metasploit Framework, you’ll develop an understading of assembly language so you can use it to exploit software applications. First, you’ll learn the basics of efficiently using assembly language in practice. Next, you’ll be introduced and explore reverse engineering. Finally, you’ll discover how to utilize the Metasploit Framework for exploitation. [Read more…]

Lynda – CISSP Cert Prep – 8 Software Development Security

Lynda – CISSP Cert Prep – 8 Software Development Security
English | Size: 224.13 MB
Category: CBTs

Prepare for the Certified Information Systems Security Professional (CISSP) exam by bolstering your knowledge of software development security practices. In this course, follow Mike Chapple as he walks through each topic in the eighth domain of the CISSP exam-Software Development Security. He covers the software development lifecycle and common software security issues, such as cookies, session hijacking, and code execution attacks. Mike also discusses secure coding practices and software security assessment. [Read more…]

Wireless Hacking and Security Course

Wireless Hacking and Security Course
English | Size: 689.52 MB
Category: CBTs

This VTC course delivers an in-depth look at wireless security, demonstrating how IEEE 802.11 wireless attacks are carried out and defended against. Veteran instructor Bobby Rogers first provides a foundation in wireless security technologies before he proceeds with practical demonstrations on securing both clients and network devices. He also demonstrates how to monitor wireless networks, capture wireless traffic, and even crack WEP and WPA keys [Read more…]

Udemy Complete WIFI Hacking Encyclopedia Tutorial-kEISO-bs

Udemy Complete WIFI Hacking Encyclopedia Tutorial-kEISO-bs
English | Size: 498.72 MB
Category: CBTs

Get ready to gain the complete wireless pen-testing knowledge in easy way. Also learn the secrets method of breaching the wireless networks.After enrolling into this course you don’t need to know anything else this course will give you the entire Network breaching ideas. After taking this course you can become self dependent you can research by yourself.A course especially designed by a group of cyber security experts(Pen-testers). [Read more…]

Pluralsight – Cybersecurity Threats Ransomware

Pluralsight – Cybersecurity Threats Ransomware
English | Size: 386.59 MB
Category: CBTs

If you’re a developer, IT admin, project manager, or a user, ransomware impacts you. Learn to identify infection points, recover files without paying a ransom, defend against and respond to attacks, and pitfalls if you do pay.
Ransomware attacks have surged recently. You see all types of organizations and users impacted by this threat. It is estimated that ransomware will increase in frequency and impact in the coming months and years. In this course, Cybersecurity Threats: Ransomware, you’ll receive comprehensive knowledge of typical infection points where ransomware can get into your systems and understand the options you have to recover your encrypted files. First, you’ll discover what tools are available, many of them free, to help you recover a system that has suffered a ransomware attack.
[Read more…]

Lynda – Programming Foundations: Web Security

Lynda – Programming Foundations: Web Security
English | Size: 321.05 MB
Category: CBTs

Learn about the most important security concerns when developing websites, and what you can do to keep your servers, software, and data safe from harm. Instructor Kevin Skoglund explains what motivates hackers and their most common methods of attacks, and then details the techniques and mindset needed to craft solutions for these web security challenges. Learn the eight fundamental principles that underlie all security efforts, the importance of filtering input and controlling output, and smart strategies for encryption and user authentication. Kevin also covers special considerations when it comes to credit cards, regular expressions, source code managers, and databases.
This course is great for developers who want to secure their client’s websites, and for anyone else who wants to learn more about web security. [Read more…]

Mastering IT Security

Mastering IT Security
English | Size: 0.99 GB
Category: CBTs

The three most important responsibilities of an IT professional are security, security, and security. This master class in IT security, produced by an expert who has spent the last 20 years securing computer and networks for the military and Fortune 500 clients, teaches the essential skills needed to secure PCs, servers, networks, mobile devices, and more. [Read more…]

Mastering Application Security

Mastering Application Security
English | Size: 938.33 MB
Category: CBTs

Writing code without taking security into account is a form of developer malpractice. But to write secure code, you first have to understand authentication, authorization, cryptography, and other tenets of security, as well as threats and countermeasures. In this series, security expert Ilya Pogrebensky takes you deep into secure coding practices and equips you with the knowledge you need to avoid becoming a headline. [Read more…]

Lynda – Windows Performance Toolkit – Malware Analysis

Lynda – Windows Performance Toolkit – Malware Analysis
English | Size: 774.92 MB
Category: Tutorial

Each time you go online, you face the threat of malware. In this course, learn how to find and analyze malware that’s undetected by most antivirus programs. Follow Thomas Pantels as he shows how to work with the Windows Performance Recorder-which is used to record system events-and the Windows Performance Analyzer, which is used to inspect those events. He explains how to find and analyze key logger patterns and then shows how to analyze screen recordings, webcam recordings, and microphone recordings.
[Read more…]