SANS SEC760: Advanced Exploit Development for Penetration Testers LABFILES


SANS SEC760: Advanced Exploit Development for Penetration Testers LABFILES
English | Size: 4.46 GB
Genre: eLearning

[Read more…]

SANS SEC505 Securing Windows with PowerShell and the critical security controls 2017 Ondemand Videos Part 2


SANS SEC505 Securing Windows with PowerShell and the critical security controls 2017 Ondemand Videos Part 2
English | Size: 1.27 GB
Genre: eLearning

[Read more…]

SANS SEC505: Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos


SANS SEC505: Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos
English | Size: 3.87 GB
Genre: eLearning

[Read more…]

SANS SEC760 Advanced Exploit Development for Penetration Testing [Text 2016]

SANS SEC760: Advanced Exploit Development for Penetration Testing [Text 2016]
English | Size: 167.68 MB
Category: Security

Vulnerabilities in modern operating systems such as Microsoft Windows 7/8, Server 2012, and the latest Linux distributions are often very complex and subtle. Yet, when exploited by very skilled attackers, these vulnerabilities can undermine an organization’s defenses and expose it to significant damage. Few security professionals have the skillset to discover, let alone even understand at a fundamental level, why the vulnerability exists and how to write an exploit to compromise it. Conversely, attackers must maintain this skillset regardless of the increased complexity. SANS SEC760: Advanced Exploit Development for Penetration Testers teaches the skills required to reverse-engineer 32-bit and 64-bit applications, perform remote user application and kernel debugging, analyze patches for 1-day exploits, and write complex exploit, such as use-after-free attacks against modern software and operating systems.
[Read more…]

SANS 508 – Advanced Digital Forensics and Incident Response [Text 2016]

SANS 508 – Advanced Digital Forensics and Incident Response [Text 2016]
English | Size: 63.85 MB
Category: Security

FOR508: Advanced Incident Response and Threat Hunting Course will help you to:

Detect how and when a breach occurred
Identify compromised and affected systems
Determine what attackers took or changed
Contain and remediate incidents
Develop key sources of threat intelligence
Hunt down additional breaches using knowledge of the adversary

DAY 0: A 3-letter government agency contacts you to say an advanced threat group is targeting organizations like yours, and that your organization is likely a target. They won’t tell how they know, but they suspect that there are already several breached systems within your enterprise. An advanced persistent threat, aka an APT, is likely involved. This is the most sophisticated threat that you are likely to face in your efforts to defend your systems and data, and these adversaries may have been actively rummaging through your network undetected for months or even years. [Read more…]

SANS – SEC564 Red Team Operations and Threat Emulation [PDF 2017]

SANS – SEC564: Red Team Operations and Threat Emulation [PDF 2017]
English | Size: 60.93 MB
Category: Security

Red Teaming is the process of using tactics, techniques, and procedures (TTPs) to emulate real-world threats to train and measure the effectiveness of the people, processes, and technology used to defend environments. Built on the fundamentals of penetration testing, Red Teaming uses a comprehensive approach to gain insight into an organization’s overall security to test its ability to detect, respond to, and recover from an attack. When properly conducted, Red Team activities significantly improve an organization’s security controls, help hone defensive capabilities, and measure the effectiveness of security operations. [Read more…]

SANS – SEC555 Siem with Tactical Analytics

SANS – SEC555 Siem with Tactical Analytics
English | Size: 380.09 MB
Category: Tutorial

Many organizations have logging capabilities but lack the people and processes to analyze it. In addition, logging systems collect vast amounts of data from a variety of data sources which require an understanding of the sources for proper analysis. This class is designed to provide individuals training, methods, and processes for enhancing existing logging solutions. This class will also provide the understanding of the when, what, and why behind the logs. This is a lab heavy course that utilizes SOF-ELK, a SANS sponsored free SIEM solution, to train hands on experience and provide the mindset for large scale data analysis. [Read more…]

SANS SEC501 Advanced Security Essentials – Enterprise Defender

SANS SEC501: Advanced Security Essentials – Enterprise Defender
English | Size: 354.09 MB
Category: Misc E-Learning

Effective cybersecurity is more important than ever as attacks become stealthier, have a greater financial impact, and cause broad reputational damage. SEC501: Advanced Security Essentials – Enterprise Defender builds on a solid foundation of core policies and practices to enable security teams to defend their enterprise.
[Read more…]

SANS SEC 542 (GWAPT) Web App Penetration Testing and Ethical Hacking MP3 2017

SANS SEC 542 (GWAPT) Web App Penetration Testing and Ethical Hacking MP3 2017
English | Size: 1.08 GB
Category: CBTs

Web applications are a major point of vulnerability in organizations today. Web app holes have resulted in the theft of millions of credit cards, major financial and reputational damage for hundreds of enterprises, and even the compromise of thousands of browsing machines that visited Web sites altered by attackers. In this intermediate to advanced level class, you’ll learn the art of exploiting Web applications so you can find flaws in your enterprise’s Web apps before the bad guys do. Through detailed, hands-on exercises and training from a seasoned professional, you will be taught the four-step process for Web application penetration testing. You will inject SQL into back-end databases, learning how attackers exfiltrate sensitive data. You will utilize cross-site scripting attacks to dominate a target infrastructure in our unique hands-on laboratory environment. And you will explore various other Web app vulnerabilities in-depth with tried-and-true techniques for finding them using a structured testing regimen. You will learn the tools and methods of the attacker, so that you can be a powerful defender. [Read more…]

SANS 577 – Virtualization Security Fundamentals – 2011WORKBOOK

SANS 577 – Virtualization Security Fundamentals – 2011WORKBOOK
English | Size: 250.53 MB
Category: e-Books

Security Course – 2011
SANS 577 – Virtualization Security Fundamentals

Lab’s Excercises. [Read more…]