Penetration Testing: Advanced Kali Linux | Malcolm Shore | LYNDA

Penetration Testing: Advanced Kali Linux | Malcolm Shore | LYNDA
English | Size: 416.27 MB
Category: CBTs

Kali Linux is the pen-testing professional’s main tool, and includes many hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course you can learn how to use Kali for advanced pen testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting. Learn how to use the basic toolset and extend Kali, integrating native exploits into the Metasploitable environment. Find out how to generate and maintain a variety of shells, including Python and C++, and discover how to collect and use credentials. Get an introduction to the online Hack The Box lab where you can practice your pen-testing skills. Instructor Malcolm Shore focuses on the advanced customization of exploits and achieving root access through a sustainable shell. He has designed the course to help the learner advance as a professional pen tester, and learn key objectives needed to pass the Offensive Security Certified Professional (OSCP) exam. The training will appeal to all ethical hackers and pen testers, as well as general IT professionals. [Read more…]

Ransomware: Practical Reverse Engineering | Malcolm Shore | LYNDA

Ransomware: Practical Reverse Engineering | Malcolm Shore | LYNDA
English | Size: 201.63 MB
Category: Tutorial

Ransomware is a growing threat, and it’s imperative that IT security professionals have the knowledge and skills needed to protect their networks and systems against these attacks. In this course, instructor Malcolm Shore provides an in-depth look at tools and techniques you can use to reverse engineer malware. He discusses how to use reverse engineering to better understand malware, and demonstrates how to approach static and dynamic malware analysis. To wrap up, he dives into a real-world example of ransomware- the devastating WannaCry malware-using this case study to help you better understand how malware functions.
[Read more…]

Penetration Testing Essential Training Malcolm Shore LYNDA

Penetration Testing Essential Training | Malcolm Shore | LYNDA
English | Size: 401.15 MB
Category: Tutorial

You’ve secured your systems, you’ve trained your users, and you’ve fortified your network. Think you’re ready to handle a cybersecurity threat? Penetration testing is one of the best ways to see if your security will hold. It puts testers in the role of attackers, looking for vulnerabilities in your networks, computers, applications, email, and even your users. This course provides an introduction to the key knowledge and skills to start a program of professional penetration testing at your organization. [Read more…]