Ethical Hacking Orchestrating Attacks

Ethical Hacking Orchestrating Attacks
English | Size: 389.82 MB
Category: CBTs

Focus on the key attacks you can use to detect flaws in websites and networks. You will begin by installing your virtual machine and Kali Linux on your system. You will also install your server and host a buggy web application. Starting with network attacks, you will begin by installing an antivirus bypass framework. You will then learn how to bypass Windows Defender and other antivirus software. Following this you will look at the post exploitation phase of the attack to determine the value of the compromised machine and to maintain control of it for later use. Shifting focus to website attacks, you will look at various vulnerabilities to watch out for and exploit. Finally, you will go through a number of attacks that can breach your website. Key attacks such as SQL injection, XSS and buffer overflows will be analyzed in detail [Read more…]

Learn Network Attacks and Security

Learn Network Attacks and Security
English | Size: 1.21 GB
Category: CBTS

If you are looking at gaining skill in Network security, this course is for you.

This hands-on course focuses on the practical side of Network attacks without neglecting the theory behind each attack.
For each attack, you will learn how that attack works and then practically launch the attack.
This will give you full understanding of the conditions which allow this attack to be successfully executed, this knowledge will help you to detect and sometimes prevent this attack from happening.
By completing this course, you will be able to troubleshoot basic security issues. [Read more…]

Cybersecurity (Attacks Red Team Activity) | Packt Publishing

Cybersecurity (Attacks Red Team Activity) | Packt Publishing
English | Size: 934.14 MB
Category: CBTs

There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network-and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans. [Read more…]

Learn Network Attacks and Security

Learn Network Attacks and Security
English | Size: 1.21 GB
Category: CBTs

If you are looking at gaining skill in Network security, this course is for you.

This hands-on course focuses on the practical side of Network attacks without neglecting the theory behind each attack.
For each attack, you will learn how that attack works and then practically launch the attack.
This will give you full understanding of the conditions which allow this attack to be successfully executed, this knowledge will help you to detect and sometimes prevent this attack from happening.
By completing this course, you will be able to troubleshoot basic security issues. [Read more…]

Cybersecurity (Attacks Red Team Activity)

Cybersecurity (Attacks Red Team Activity)
English | Size: 934.14 MB
Category: CBTs

There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network-and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans.
[Read more…]

Udemy – ARP spoofing &Man In The Middle Attacks Execution &Detection

Udemy – ARP spoofing &Man In The Middle Attacks Execution &Detection
English | Size: 645.90 MB
Category: Tutorial

Learn practical attacks to test the security of clients connected to a network and how to protect against these attacks [Read more…]

Pluralsight – Threats, Attacks, and Vulnerabilities for CompTIA Security+

Pluralsight – Threats, Attacks, and Vulnerabilities for CompTIA Security+
English | Size: 422.18 MB
Category: Tutorial

This course covers domain one of the CompTIA Security+ certification exam. In this course, Threats, Attacks, and Vulnerabilities for CompTIA Security+, you’ll learn about the various types of threats and attacks every company faces. First, you’ll learn the ins and outs of Malware, ransom-ware, viruses, Trojans, rootkits, social engineering attacks, application vulnerabilities, and DDoS attacks. Next, you’ll also learn the characteristics of the various types of threat actors, the skills they have and the tools they use. Finally, you’ll learn about penetration testing and vulnerability scanning and how they’re used to help tighten security and mitigate potential breaches. By the end of this course, you’ll have a solid understanding of the various threats you’re likely to face and what tools are available to mitigate these threats. [Read more…]

Cross Site Scripting (XSS) Attacks for Pentesters

Cross Site Scripting (XSS) Attacks for Pentesters
English | Size: 162.71 MB
Category: CBTs

Cross Site Scripting or XSS is still one of the most common injection vulnerability that exist in modern as well as legacy Web Applications. This course will teach XSS in-depth and even talk about the lesser known derivatives of XSS called Mutation XSS (mXSS) and Relative Path Overwrite XSS (RPO XSS). If you are interested in learning about the different types of XSS, different context in XSS, and about real world red team XSS Exploitation, then this course is for you and it does not take hours. Invest just 2 hours and master XSS in-depth.
[Read more…]

Skip to toolbar