Web services testing with Burp Suite

Web services testing with Burp Suite
English | Size: 140.31 MB
Category: Tutorial

Want to learn how to use Burp beyond just the capture of requests and responses? This course helps get you up and running quickly to take advantage of all the functionality in the Burp Suite.

In this course, Web Application Penetration Testing with Burp Suite, you will learn hands-on techniques for attacking web applications and web services using the Burp Suite penetration testing tool. This course is designed to expand your knowledge of the Burp Suite beyond just capturing requests and responses. First, you’ll learn about scoping your target application properly. Next, you’ll spend some time scanning to trigger potential security vulnerabilities in your target, then digging deep into the results to validate your findings. Finally, you’ll wrap up by leaning how to properly report your results to your audience. By the end this course, you’ll know how to perform all of these techniques at a comfortable and efficient level to better perform your job as a pen tester. [Read more…]

Penetration Testing Essential Training Malcolm Shore LYNDA

Penetration Testing Essential Training | Malcolm Shore | LYNDA
English | Size: 401.15 MB
Category: Tutorial

You’ve secured your systems, you’ve trained your users, and you’ve fortified your network. Think you’re ready to handle a cybersecurity threat? Penetration testing is one of the best ways to see if your security will hold. It puts testers in the role of attackers, looking for vulnerabilities in your networks, computers, applications, email, and even your users. This course provides an introduction to the key knowledge and skills to start a program of professional penetration testing at your organization. [Read more…]

Packt Publishing – Automated UI Testing in Android

Packt Publishing – Automated UI Testing in Android
English | Size: 844.89 MB
Category: Tutorial

The course follows a systematic approach to the automated testing of Android applications and also shows how to tackle corner cases.

The approach is mainly practice-oriented and mostly based on practical samples. During the course, you’ll make some samples and then enhance them step-by-step, covering more advanced topics.

The Automated UI Testing for Android course is practice-oriented and explains major approaches to automating Android application testing. [Read more…]

Pluralsight – Penetration Testing The Big Picture

Pluralsight – Penetration Testing The Big Picture
English | Size: 180.49 MB
Category: Tutorial

Penetration testing is a highly sought after consulting service and a needed information security professional skill set. This course defines penetration testing and highlights its role in the context of a security management program.
[Read more…]

Packt Publishing – Advanced Solutions in Go – Testing and Distributed Systems

Packt Publishing – Advanced Solutions in Go – Testing and Distributed Systems
English | Size: 394.70 MB
Category: Tutorial

This guide is a handy reference for developers to quickly look up Go development patterns. It is a companion to other resources and a reference that will be useful long after reading it through the first time. Each video includes working, simple, and tested code that can be used as a reference or foundation for your own applications. [Read more…]

Sans – SEC560 Network Penetration Testing and Ethical Hacking

Sans – SEC560 Network Penetration Testing and Ethical Hacking
English | Size:
Category:

Section 0 – Getting started with your OnDemand SANS series
0.1 Welcome to your Sans OnDemand course
0.2 Introduction to Lab exercises
Section 1 – Comprehensive pen testing planning, scoping and reconnaissance
1.1 Pen testing foundations
1.2 Pen testing process
1.3 Reconnaissance
1.4 Appendix intro to Linux
[Read more…]

LiveLessons – Security Penetration Testing (The Art of Hacking Series)

LiveLessons – Security Penetration Testing (The Art of Hacking Series)
English | Size: 5.42 GB
Category: Tutorial

This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, exploitation, and post-exploitation techniques. This course provides step-by-step real-life scenarios. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim, how to assess systems, network security controls, and security posture. [Read more…]

Pluralsight – Writing Penetration Testing Reports

Pluralsight – Writing Penetration Testing Reports
English | Size: 241.18 MB
Category: Tutorial

Writing penetration testing reports is a critical skill. Reporting occupies a considerable portion of your time on an assessment, it’s a required skill on your career path, and reports are the primary deliverable to a customer on every engagement. In this course, Writing Penetration Testing Reports, you’ll learn how to write penetration testing report. First, you’ll discover how to report on the results from a penetration test. Next, you’ll explore tips to become more effective at the reporting process. Finally, you’ll learn how to save time while reporting. By the end of this course, you’ll have a better understanding on how to write penetration testing reports.
[Read more…]

SANS SEC660 Advanced Penetration Testing, Exploits, And Ethical Hacking (2014)

SANS SEC660 Advanced Penetration Testing, Exploits, And Ethical Hacking (2014)
English | Size: 513.36 MB
Category: Tutorial

SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking is designed as a logical progression point for those who have completed SANS SEC560: Network Penetration Testing and Ethical Hacking, or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real-world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a hands-on lab to consolidate advanced concepts and facilitate the immediate application of techniques in the workplace. Each day of the course includes a two-hour evening boot camp to drive home additional mastery of the techniques discussed. A sample of topics covered includes weaponizing Python for penetration testers, attacks against network access control (NAC) and virtual local area network (VLAN) manipulation, network device exploitation, breaking out of Linux and Windows restricted environments, IPv6, Linux privilege escalation and exploit-writing, testing cryptographic implementations, fuzzing, defeating modern OS controls such as address space layout randomization (ASLR) and data execution prevention (DEP), return-oriented programming (ROP), Windows exploit-writing, and much more! [Read more…]

Pluralsight – Wireless Network Penetration Testing Advanced Techniques

Pluralsight – Wireless Network Penetration Testing Advanced Techniques
English | Size: 153.54 MB
Category: Tutorial

As attackers shift their techniques to attack not only technology but people, it is imperative that you are as vigilant as ever. In this course, Wireless Network Penetration Testing Advanced Techniques, you’ll focus on red teaming attacks so that you can identify the weaknesses in your own wireless networks and stop a potential compromise from ever occurring. First, you’ll delve into rogue access points and fake captive portals.
[Read more…]