UDEMY – Ethical Hacking – Whitehat Hacking and Penetration Testing

UDEMY – Ethical Hacking – Whitehat Hacking and Penetration Testing
English | Size: 0.99GB
Category: Tutorial

In this Ethical Hacking – Whitehat Hacking and Penetration testing tutorial, expert ethical hacker Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks. [Read more…]

SANS SEC 542 (GWAPT) Web App Penetration Testing and Ethical Hacking MP3 2017

SANS SEC 542 (GWAPT) Web App Penetration Testing and Ethical Hacking MP3 2017
English | Size: 1.08 GB
Category: CBTs

Web applications are a major point of vulnerability in organizations today. Web app holes have resulted in the theft of millions of credit cards, major financial and reputational damage for hundreds of enterprises, and even the compromise of thousands of browsing machines that visited Web sites altered by attackers. In this intermediate to advanced level class, you’ll learn the art of exploiting Web applications so you can find flaws in your enterprise’s Web apps before the bad guys do. Through detailed, hands-on exercises and training from a seasoned professional, you will be taught the four-step process for Web application penetration testing. You will inject SQL into back-end databases, learning how attackers exfiltrate sensitive data. You will utilize cross-site scripting attacks to dominate a target infrastructure in our unique hands-on laboratory environment. And you will explore various other Web app vulnerabilities in-depth with tried-and-true techniques for finding them using a structured testing regimen. You will learn the tools and methods of the attacker, so that you can be a powerful defender. [Read more…]

Offensive-Security-PWK-Penetration Testing with Kali tar gz

Offensive-Security-PWK-Penetration Testing with Kali tar gz
English | Size: 657.89 MB
Category: Tutorial

Security Trainning – PTK 2014
360 Pages + videos

0. $!Penetration!Testing:!What!You!Should!Know
1. $!Getting!Comfortable!with!Kali!Linux!.
2. $!The!Essential!Tools!
3. $!Passive!Information!Gathering!
4. $!Active!Information!Gathering!
5. $!Vulnerability!Scanning
6. $!Buffer!Overflows!…
7. $!Win32!Buffer!Overflow!Exploitation! [Read more…]

PLURALSIGHT PLAY BY PLAY A PENETRATION TESTERS GUIDE TO SOCIAL ENGINEERING TUTORIAL-kEISO

PLURALSIGHT PLAY BY PLAY A PENETRATION TESTERS GUIDE TO SOCIAL ENGINEERING TUTORIAL-kEISO
English | Size: 495.22 MB
Category: CBTs

Play by Play is a series in which top technologists work through a problem in real time, unrehearsed, and unscripted. In this course, Play by Play: A Penetration Tester?s Guide to Social Engineering, Stephen Haunts and Lars Klint are going to delve into the shadowy world of social engineering. Learn about information gathering pre-texting, and manipulation. By the end of this course you?ll know a wide range of techniques that you can use to protect yourself and your company from a social engineering attack [Read more…]

Penetration Testing Essential Training Malcolm Shore LYNDA

Penetration Testing Essential Training | Malcolm Shore | LYNDA
English | Size: 401.15 MB
Category: Tutorial

You’ve secured your systems, you’ve trained your users, and you’ve fortified your network. Think you’re ready to handle a cybersecurity threat? Penetration testing is one of the best ways to see if your security will hold. It puts testers in the role of attackers, looking for vulnerabilities in your networks, computers, applications, email, and even your users. This course provides an introduction to the key knowledge and skills to start a program of professional penetration testing at your organization. [Read more…]

Pluralsight – Penetration Testing in Action

Pluralsight – Penetration Testing in Action
English | Size: 177.87 MB
Category: CBTs

This course models real world attacks, allowing you to have a broader and organic understanding of real-world attacks, measuring real business risks. In this course, Penetration Testing in Action, you’ll learn about penetration testing in action. First, you’ll begin with a reconnaissance and search for vulnerabilities on the target web site. This will set up a real-world model. Next, you’ll explore how to exploit an SQL injection vulnerability, download and crack the website password hashes, upload a web shell, backdoor the login page, escalate our privileges, install a rootkit, and get persistent access to the system. [Read more…]

Pluralsight – Penetration Testing The Big Picture

Pluralsight – Penetration Testing The Big Picture
English | Size: 180.49 MB
Category: Tutorial

Penetration testing is a highly sought after consulting service and a needed information security professional skill set. This course defines penetration testing and highlights its role in the context of a security management program.
[Read more…]

SEC642 Advanced Web App Penetration-BS

SEC642 Advanced Web App Penetration
English | Size: 3.56 GB
Category: Tutorial

includes:
Ondemands
MP3
Tools [Read more…]

SANS SEC642 Advanced Web App Penetration Testing, and Exploitation Techniques (2016) PDFs

SANS SEC642: Advanced Web App Penetration Testing, and Exploitation Techniques (2016) PDFs
English | Size: 123.79 MB
Category: Tutorial

As web applications and their mobile counterparts become more complex and hardened against attack, penetration testers need to continually update the techniques and tools they use to evaluate the security of these systems. This includes understanding how the various new technologies work, which tools work with cutting-edge technologies like HTTP/2 and NoSQL, how to perform special penetration tests like Web Application Firewall inspections, and how to perform custom exploitation to demonstrate maximum impact for the applications you test. This course is designed to expand past the methodology and the ‘how’ when we are presented with the challenges of web penetration testing, and dig into the more esoteric ‘why’ these techniques and tools work, so that you can adapt as needed in your assessments.
[Read more…]

Sans – SEC560 Network Penetration Testing and Ethical Hacking

Sans – SEC560 Network Penetration Testing and Ethical Hacking
English | Size:
Category:

Section 0 – Getting started with your OnDemand SANS series
0.1 Welcome to your Sans OnDemand course
0.2 Introduction to Lab exercises
Section 1 – Comprehensive pen testing planning, scoping and reconnaissance
1.1 Pen testing foundations
1.2 Pen testing process
1.3 Reconnaissance
1.4 Appendix intro to Linux
[Read more…]