Packt – End-to-End Penetration Testing with Kali Linux Oct2018

Packt – End-to-End Penetration Testing with Kali Linux Oct2018
English | Size: 1.64 GB
Category: Elearning | Linux

Kali Linux contains a large number of penetration testing tools from various different niches of the security and forensics fields. Kali Linux offers a multitude of options to scan a single IP, port, or host (or a range of IPs, ports, and hosts) and discover vulnerabilities and security holes. This output and information can serve as a precursor to penetration testing efforts. In this course, you will perform tests to carry out and exploit hidden vulnerabilities within your network and systems; you will not only expose these but will also provide ways and methods to fix, secure, and harden your system’s security, protecting it against any other attacks.
[Read more…]

Packt – Hands-on penetration testing Metasploit Oct2018

Packt – Hands-on penetration testing Metasploit Oct2018
English | Size: 770.42 MB
Category: Tutorial

Metasploit is the best and most widely used tool for penetration testing, providing powerful attack simulations, security assessment management, and more. Metasploit is used by White Hat, and by Black Hat, hackers. Metasploit is a playground for hackers where they demonstrate their skill by protecting or damaging the target. In this course, you’ll learn how to use Metasploit to enumerate services, identify potential weaknesses, test vulnerabilities through exploitation, and gather evidence for reporting. First, you’ll explore several supporting tools on Kali Linux. Next, you’ll explore how exploits and payloads work together to gain access to systems. Finally, you’ll learn how Metasploit Framework works. By the end of this course, you’ll have a better understanding of how to use Metasploit to quickly assess the security posture of systems and networks to reduce the risk of attack. [Read more…]

Lynda Security Testing Nmap Security Scanning

Lynda Security Testing Nmap Security Scanning
English | Size: 222.79 MB
Category: Tutorial

In this course, learn how to use this open-source tool for port scanning of systems and
network devices. [Read more…]

Packtpub – Learning Selenium Testing Tools [Video]

Packtpub – Learning Selenium Testing Tools [Video]
English | Size: 270.17 MB
Category: E-learning | others

There is often a need to test your web applications against a vast number of browsers and platforms due to their increasing complexity. For this, you need to build highly reliable and maintainable test automation cases. Here’s where Selenium comes in – it is one of the most easy-to-implement and efficient solutions for this.
[Read more…]

Certified Penetration Testing Engineer (CPTE)

Certified Penetration Testing Engineer (CPTE)
English | Size: 9.29 GB
Category: Tutorial

The Certified Penetration Testing Engineer (CPTE) is a vendor-neutral certification offered by Mile2 for aspiring penetration testing engineers who are looking to enhance their hands-on experience regarding the penetration testing methodologies used by the industry professionals.
The course also covers the five key elements of penetration testing, namely; information gathering, scanning, enumeration, exploitation and reporting. These five key elements form a basis of discovering the vulnerabilities in a given system. [Read more…]

BBST courses in Software Testing

BBST courses in Software Testing
English | Size: 1.41 GB
Category: CBTs

The courses have a strong academic background and a layer of practical exercises. They help participants build sound and strong software testing skills, from deeply understanding and using fundamental testing skills to bug investigation and advocacy and skills to design tests:
[Read more…]

WiFi Hacking Wireless Penetration Testing for Beginners [Video]

WiFi Hacking: Wireless Penetration Testing for Beginners [Video]
English | Size: 5.56 GB
Category: CBTs

This course includes an overview of the various types of wireless (802.11) networks, available encryption security systems (WEP, WPA, and WPA2), and how to use open-source tools to hack and crack these vulnerable wireless (WiFi) networks. Since their introduction in 1999, wireless networks have been rapidly expanding in their usage and availability Unfortunately, many people believe these wireless networks are designed as a secure solution for sharing data, but this is rarely the case. In this course, you will gain a deeper understanding of the WEP, WPA, and WPA2 wireless security protocols, and how to exploit their vulnerabilities in order to gain access to any wireless network during a penetration test. You will use this information to increase the security of your networks and to implement a better defensive security posture to prevent an attacker from accessing your networks [Read more…]

Packt – Wireless Penetration Testing for Ethical Hackers

Packt – Wireless Penetration Testing for Ethical Hackers
English | Size: 503.64 MB
Category: CBTs

There are many tools available on the market for detecting security loopholes and networking attacks. Selecting the right tools and methods might seem confusing, but this course is designed to help navigate through those choices. This course will demonstrate how to perform wireless penetration attacks against wireless networks and their protocols in order to build strong and robust security systems from the ground up using the most popular tools in the penetration testing community. [Read more…]

CISSP Cert Prep 6 Security Assessment and Testing (2018) Mike Chapple LYNDA

CISSP Cert Prep: 6 Security Assessment and Testing (2018) | Mike Chapple | LYNDA
English | Size: 244.08 MB
Category: Tutorial

Learn about security assessment and testing practices needed to prepare for the Certified Information Systems Security Professional (CISSP) exam. CISSP-the industry’s gold standard certification-is necessary for many top jobs. This course helps you approach the exam with confidence by providing coverage of key topics, including threat assessment, log monitoring, and software testing. It also covers disaster recovery and security process assessment. Students who complete this course will be prepared to answer questions on the sixth CISSP exam domain: Security Assessment and Testing. [Read more…]

Udemy – Certified Penetration Testing Consultant (CPTC)

Udemy – Certified Penetration Testing Consultant (CPTC)
English | Size: 6.84 GB
Category: E-learning | HACKING | Linux | Networking | others

The Certified Penetration Testing Consultant (CPTC) course teaches the IT security professionals and IT network administrators about the penetration tests to check the security of large and complex network infrastructures. The course is based on the real world scenarios similar to large corporate networks, services provider networks and telecommunication networks. The course focuses on the attacks on the underlying network infrastructure and protocol loopholes rather than the L4-L7 attacks. [Read more…]