Lynda – Ethical Hacking – Hacking IoT Devices

Lynda – Ethical Hacking – Hacking IoT Devices
English | Size: 111.9 MB
Category: Programming | Cloud-Comp | E-learning | HACKING | Networking | Security | others


The number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge challenge. In this course, Luciano Ferrari discusses how IoT devices work, including the architectures and protocols used. He covers the main attack surfaces used by hackers and security professionals against IoT devices, how to assess IoT security threats and vulnerabilities, and how to properly secure the devices by following industry best practices and implementing countermeasures. [Read more…]

Udemy – Ethical Hacking in Offensive Way Core Ethical Hacking Kit

Udemy – Ethical Hacking in Offensive Way Core Ethical Hacking Kit
English | Size: 4.15 GB
Category: Tutorial


What Will I Learn?
Do a Complete Black Box Testing
Unleaash the Power of Best Ethical Tools
Hack Real Machines from Lecture 4
Develop Experience to do Real Life Penetration Testing
Description
Start Breaking Real Machines from Lecture 4
This is an Exclusive Course by Proficient School and our Instructor has requested not to reveal his identity.
[Read more…]

Linkedin – Learning Ethical Hacking Hacking Iot Devices-BiFiSO

Linkedin – Learning Ethical Hacking Hacking Iot Devices-BiFiSO
English | Size: 111.92 MB
Category: Tutorial


The number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge challenge. In this course, Luciano Ferrari discusses how IoT devices work, including the architectures and protocols used. He covers the main attack surfaces used by hackers and security professionals against IoT devices, how to assess IoT security threats and vulnerabilities, and how to properly secure the devices by following industry best practices and implementing countermeasures. [Read more…]

Udemy – Learn Ethical Hacking From Scratch

Udemy – Learn Ethical Hacking From Scratch
English | Size: 9.18 GB
Category: Tutorial


Requirements
Basic IT Skills
No Linux, programming or hacking knowledge required.
Computer with a minimum of 4GB ram/memory
Operating System: Windows / OS X / Linux
For WiFi cracking (10 lectures ONLY) – Wireless adapter that supports monitor mode (more info provided in the course). [Read more…]

Fundamentals of Pentest, Ethical Hacking and Cyber Security

Fundamentals of Pentest, Ethical Hacking and Cyber Security
English | Size: 2.22 GB
Category: Tutorial

Gain the ability to do ethical hacking and penetration testing by taking this course! Get answers from an experienced IT expert to every single question you have related to the learning you do in this course including installing Kali Linux, installing Metasploitable, installing Windows, How to use Virtual Machine Workstation or Oracle VirtualBox, basics of Linux and Distributions, VPN, Macchanger, Nmap, cracking wifi, aircrack, DoS attacks, SLL strip, known vulnerabilities, SQL injections, cracking Linux passwords, and much much more topics that are added regularly!
[Read more…]

Ethical Hacking With Python, JavaScript and Kali Linux

Ethical Hacking With Python, JavaScript and Kali Linux
English | Size: 12.45 GB
Category: CBTs

Ethical Hacking With Python, JavaScript and Kali Linux
Become Ethical Hacker by building your own payloads with Python and JavaScript. (Real World Attacks Included)
[Read more…]

Ethical Hacking Hacking using Linux Termux From Scratch

Ethical Hacking Hacking using Linux Termux From Scratch
English | Size: 4.90 GB
Category: CBTs

Ethical Hacking: Hacking using Linux & Termux From Scratch
Ethical Hacking using Linux & Android Termux (2×1 Hacking Course): Start now as a Beginner to become a Real Life Hacker
[Read more…]

Packt CompTIA Pentest (Ethical Hacking) Course and Practice Exam

Packt CompTIA Pentest (Ethical Hacking) Course and Practice Exam
English | Size: 6.38 GB
Category: Tutorial

The CompTIA Pentest+ certification is an intermediate-level vendor-neutral certification that validates your knowledge and ability to plan/scope an assessment, understand the legal/compliance requirements, perform vulnerability scanning/penetration test, and analyze/report on your findings. This certification was released by CompTIA to fill a gap between the foundational-level CompTIA Security+ exam (for those with about 1 year in the field) and the advanced-level CompTIA Advanced Security Practitioner (for those with at least 5 years in the field). The CompTIA Pentest+ exam is focused on the technical, hands-on details of the cybersecurity field, including how to emulate a cyber threat, infiltrate a secure network architecture, and conduct a penetration test against your organizational networks (with permission, of course). [Read more…]

LINKEDIN LEARNING ETHICAL HACKING INTRODUCTION TO ETHICAL HACKING

LINKEDIN LEARNING ETHICAL HACKING INTRODUCTION TO ETHICAL HACKING
English | Size: 237.27 MB
Category: CBTs

What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization’s network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it’s one of the most desired skills for any IT security professional. If you’re interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today’s threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more. [Read more…]

Ethical Hacking – Denial of Service

Ethical Hacking – Denial of Service
English | Size: 310.88 MB
Category: HACKING | Security

DoS and DDoS are disruptive attacks meant to bring a server or network out of operation. You might have seen some of this in the news, specially as related to hacktivism or (people who are hack for a cause). A DDoS attack can be a big financial hit on an organization and in this module you will learn how this type of attack is accomplished and even how it can be done in stealthy ways; as an ethical hacker you will get the point of view of the attacker as usual but you will also learn how to protect your organization from this type of event using the right tools and strategies
Course Duration: 01hrs 56min [Read more…]