Certified Penetration Testing Engineer (CPTE)

Certified Penetration Testing Engineer (CPTE)
English | Size: 9.29 GB
Category: Tutorial

The Certified Penetration Testing Engineer (CPTE) is a vendor-neutral certification offered by Mile2 for aspiring penetration testing engineers who are looking to enhance their hands-on experience regarding the penetration testing methodologies used by the industry professionals.
The course also covers the five key elements of penetration testing, namely; information gathering, scanning, enumeration, exploitation and reporting. These five key elements form a basis of discovering the vulnerabilities in a given system. [Read more…]

BBST courses in Software Testing

BBST courses in Software Testing
English | Size: 1.41 GB
Category: CBTs

The courses have a strong academic background and a layer of practical exercises. They help participants build sound and strong software testing skills, from deeply understanding and using fundamental testing skills to bug investigation and advocacy and skills to design tests:
[Read more…]

WiFi Hacking Wireless Penetration Testing for Beginners [Video]

WiFi Hacking: Wireless Penetration Testing for Beginners [Video]
English | Size: 5.56 GB
Category: CBTs

This course includes an overview of the various types of wireless (802.11) networks, available encryption security systems (WEP, WPA, and WPA2), and how to use open-source tools to hack and crack these vulnerable wireless (WiFi) networks. Since their introduction in 1999, wireless networks have been rapidly expanding in their usage and availability Unfortunately, many people believe these wireless networks are designed as a secure solution for sharing data, but this is rarely the case. In this course, you will gain a deeper understanding of the WEP, WPA, and WPA2 wireless security protocols, and how to exploit their vulnerabilities in order to gain access to any wireless network during a penetration test. You will use this information to increase the security of your networks and to implement a better defensive security posture to prevent an attacker from accessing your networks [Read more…]

Packt – Wireless Penetration Testing for Ethical Hackers

Packt – Wireless Penetration Testing for Ethical Hackers
English | Size: 503.64 MB
Category: CBTs

There are many tools available on the market for detecting security loopholes and networking attacks. Selecting the right tools and methods might seem confusing, but this course is designed to help navigate through those choices. This course will demonstrate how to perform wireless penetration attacks against wireless networks and their protocols in order to build strong and robust security systems from the ground up using the most popular tools in the penetration testing community. [Read more…]

CISSP Cert Prep 6 Security Assessment and Testing (2018) Mike Chapple LYNDA

CISSP Cert Prep: 6 Security Assessment and Testing (2018) | Mike Chapple | LYNDA
English | Size: 244.08 MB
Category: Tutorial

Learn about security assessment and testing practices needed to prepare for the Certified Information Systems Security Professional (CISSP) exam. CISSP-the industry’s gold standard certification-is necessary for many top jobs. This course helps you approach the exam with confidence by providing coverage of key topics, including threat assessment, log monitoring, and software testing. It also covers disaster recovery and security process assessment. Students who complete this course will be prepared to answer questions on the sixth CISSP exam domain: Security Assessment and Testing. [Read more…]

Udemy – Certified Penetration Testing Consultant (CPTC)

Udemy – Certified Penetration Testing Consultant (CPTC)
English | Size: 6.84 GB
Category: E-learning | HACKING | Linux | Networking | others

The Certified Penetration Testing Consultant (CPTC) course teaches the IT security professionals and IT network administrators about the penetration tests to check the security of large and complex network infrastructures. The course is based on the real world scenarios similar to large corporate networks, services provider networks and telecommunication networks. The course focuses on the attacks on the underlying network infrastructure and protocol loopholes rather than the L4-L7 attacks. [Read more…]

Penetration Testing: Advanced Kali Linux | Malcolm Shore | LYNDA

Penetration Testing: Advanced Kali Linux | Malcolm Shore | LYNDA
English | Size: 416.27 MB
Category: CBTs

Kali Linux is the pen-testing professional’s main tool, and includes many hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course you can learn how to use Kali for advanced pen testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting. Learn how to use the basic toolset and extend Kali, integrating native exploits into the Metasploitable environment. Find out how to generate and maintain a variety of shells, including Python and C++, and discover how to collect and use credentials. Get an introduction to the online Hack The Box lab where you can practice your pen-testing skills. Instructor Malcolm Shore focuses on the advanced customization of exploits and achieving root access through a sustainable shell. He has designed the course to help the learner advance as a professional pen tester, and learn key objectives needed to pass the Offensive Security Certified Professional (OSCP) exam. The training will appeal to all ethical hackers and pen testers, as well as general IT professionals. [Read more…]

Udemy – Certified Penetration Testing Consultant (CPTC)

Udemy – Certified Penetration Testing Consultant (CPTC)
English | Size: 6.84 GB
Category: E-learning | HACKING | Linux | Networking | others

The Certified Penetration Testing Consultant (CPTC) course teaches the IT security professionals and IT network administrators about the penetration tests to check the security of large and complex network infrastructures. The course is based on the real world scenarios similar to large corporate networks, services provider networks and telecommunication networks. The course focuses on the attacks on the underlying network infrastructure and protocol loopholes rather than the L4-L7 attacks. [Read more…]

WintellectNOW Hands On with Application Penetration Testing Tutorial

WintellectNOW Hands On with Application Penetration Testing Tutorial
English | Size: 1GB
Category: Tutorial

Penetration testing ("pen-testing") is normally something hackers do to identify vulnerbilities in apps and Web sites. But you can beat the bad guys to the punch by pen-testing your own software and eliminating the vulnerabilties before you go live. In this hands-on series, security guru Bill Sempf introduces tools and techniques for doing just that. A must-see for developers everywhere! [Read more…]

SANS SEC542 Web App Penetration Testing and Ethical Hacking – VoD

SANS SEC542: Web App Penetration Testing and Ethical Hacking – VoD
English | Size: 4.47 GB
Category: E-learning | Security

Web applications play a vital role in every modern organization. But, if your organization does not properly test and secure its web apps, adversaries can compromise these applications, damage business functionality, and steal data. Unfortunately, many organizations operate under the mistaken impression that a web application security scanner will reliably discover flaws in their systems.
[Read more…]