PluralSight – Ethical Hacking Penetration Testing

PluralSight – Ethical Hacking Penetration Testing-REBAR
English | Size: 473.48 MB
Category: Tutorial


Pluralsight is not an official partner or accredited training center of EC-Council. What’s penetration testing? Well it’s simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can’t stop attackers, your job is to slow them down. How? Let’s start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client’s, using the same tools, techniques, and steps that an attacker would. The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts. [Read more…]

Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking

Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking
English | Size: 4.84 GB
Category: Ethical Hacking


More than 3.5 hours of video instruction to help you learn the skills necessary to perform advanced penetration testing in an enterprise networking environment. [Read more…]

eLearnSecurity Penetration Tester eXtreme

eLearnSecurity Penetration Tester eXtreme
English | Size: 975.91 MB
Category: Security


Course at a glance

Obscure ways of exploitation and backdooring
Advanced client side exploitation techniques
Custom attack vector and payload creation
In depth Active Directory Reconnaissance & Enumeration
In depth analysis of Active Directory exploitation
Stealthy lateral movement and evasion against modern defenses
In depth analysis of critical domain infrastructure exploitation
In depth details of common misconfigurations and weaknesses
Details for covert operations and stealthy persistence
Extremely Hands-on with challenges in virtual-labs
Obtaining the eCPTX certification qualifies you for 40 CPE [Read more…]

PluralSight – Web Application Penetration Testing Weak Cryptography

PluralSight – Web Application Penetration Testing Weak Cryptography-ELOHiM
English | Size: 88.62 MB
Category: Tutorial

Cryptography is used to secure modern web applications. The problem is that quite many things can go wrong and weak cryptography can lead to very severe consequences. That’s why this subject is interesting for penetration testers. [Read more…]

eLearnSecurity – Web Application Penetration Testing eXtreme v2 (WAPTXv2) + Labs Virtual Machine

eLearnSecurity – Web Application Penetration Testing eXtreme v2 (WAPTXv2) + Labs Virtual Machine
English | Size: 12.47 GB
Category: Ethical hacking

eLearnSecurity Web Application Penetration Testing eXtreme v2 (WAPTXv2) + Labs Virtual Machine [Read more…]

eLearnSecurity – Penetration Tester eXtreme ePTX v1

eLearnSecurity – Penetration Tester eXtreme ePTX v1
English | Size: 646.66 MB
Category: Networking | Security

eLearnSecurity Penetration Tester eXtreme ePTX v1
PTX is an online, self-paced training course that provides the knowledge and skills to execute state-sponsored-like operations, perform advanced adversary simulation and covers implementation details on numerous undocumented attacks plus much more. PTX comes with lifetime access to course material and flexible access to the most sophisticated virtual labs on Network and Web Application Security. [Read more…]