Ethical Hacking – The Ultimate Bundle
This bundle is a white hat hackers dream come true! Roll your sleeves up and put away all those distractions before you dive into this amazing collection of courses that will teach you basics and advanced level ethical hacking skills. Once acquired, please abide by the code of honour and use your newly acquired skills for the good of humanity only!
Make in-house Hacking and Penetration testing Lab
$49 Value
Real world hacking and penetration testing - Professional level
$200 Value
Learn GREP and SED on Linux for Beginners
$99 Value
Learn Basic Linux Shell Course
$99 Value
Wireless Penetration Testing with Kali Linux & Raspberry Pi
$37 Value
Learn Bash Shell in Linux for Beginners
$99 Value
Hackproof your Linux server
$99 Value
Step by Step Web Applications Penetration Tester
$99 Value
WordPress Hacking and Hardening in Simple Steps
$99 Value
Learn Server Security With BitNinja
$99 Value
IT Security for Project Managers
FREE
Secure Programming of Web Applications - Developers and TPMs
$35 Value
The Complete Python Hacking Course: Beginner to Advanced
$9.99 Value
Learn Ethical Hacking: Beginner to Advanced!
$9.99 Value
Certified Ethical Hacker Boot Camp
$9.99 Value
WordPress Security 2017: Secure Your Site Against Hackers!
$94 Value
Java Cryptography Architecture: Secure Password Hashing
$12 Value
File Encryption Basics and Practices with CrococryptFile
FREE
Introduction to Encryption - Terminology and Technology
$20 Value
Live Coaching Webinars and Online Q&A Community
Assisted Learning
Make in-house Hacking and Penetration testing Lab
Instructor: Atul Tiwari
Real world hacking and penetration testing - Professional level
Instructor: Atul Tiwari
Learn GREP and SED on Linux for Beginners
Instructor: EDUmobile Academy
Learn Basic Linux Shell Course
Instructor: EDUmobile Academy
- How to open the linux terminal
- All about directories
- Listing a directory’s contents
- Understanding file permissions
- Changing permissions
- How to make and remove directories
- Using the wildcard characters * and ?
- Copying, moving, and removing files.
- Removing non-empty directories
- Using redirection and piping.
Wireless Penetration Testing with Kali Linux & Raspberry Pi
Instructor: Cristian Gradisteanu
Learn Bash Shell in Linux for Beginners
Instructor: EDUmobile Academy
Hackproof your Linux server
Instructor: Gabriel Avramescu
- I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.
- Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking).
- Make recommendations on security weaknesses and report on activities and findings.
- Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated)
- Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment Perform analysis and testing to verify the strengths and weaknesses of Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.) Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures Assist with the development of remediation services for identified findings Customize, operate, audit, and maintain security related tools and applications IT Trainer
- OSCE
- OSWE
- OSWP
- CREST Registered Penetration Tester (CRT)
- OSCP
- CHFI (Computer Hacking Forensic Investigator)
- ISO 270001 Lead Auditor
- ECSA (EC-Council Security Analyst)
- CEH (Certified Ethical Hacker)
- CCNA and CCNA Security
- CCNP Routing and CCNP Switching
- Advanced Linux&InfoSEC
- VMWare vSphere Install, Configure, Manage
- Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.
Step by Step Web Applications Penetration Tester
Instructor: Gabriel Avramescu
- Core problems (Causes. Defences)
- Web Technologies (HTTP Protocol, Web Functionality, Encoding)
- Mapping (Spidering and Analysing)
- Attacking Authentication (Technologies, Flaws, Fixes, Brute Force)
- Attacking Session Management (State, Tokens, Flaws)
- Attacking Access Controls (Common Vulnerabilities, Attacks)
- Attacking Data Stores (SQL Injection, Bypassing Filters, Escalation)
- Bypassing Client-Side Controls (Browser Interception, HTML interception, Fixes)
- Attacking the server (OS command Injection, Path Traversal, Mail Injection, File Upload)
- Attacking Application Logic Cross Site Scripting
- Attacking Users (CSRF, ClickJacking, HTML Injection) Demos:
- Spidering, Website Analyser
- Brute-Force
- Session Hijacking via Mann-in-The-Middle
- Get Gmail or Facebook Passwords via SSLStrip
- SQL Injection
- Upload File and Remote Execution
- Cross-Site Scripting (Stored + Reflected, Preventing XSS)
- CSRF (Change password trough CSRF vuln., Preventing CSRF)
- I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.
- Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking).
- Make recommendations on security weaknesses and report on activities and findings.
- Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated)
- Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment
- Perform analysis and testing to verify the strengths and weaknesses of Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.)
- Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures
- Assist with the development of remediation services for identified findings
- Customize, operate, audit, and maintain security related tools and applications IT Trainer
- CEH, ECSA, CHFI from EC-Council
- Cisco CCNA, CCNA Security, Linux Essentials Certifications
- OSCE
- OSWE
- OSWP
- CREST Registered Penetration Tester (CRT)
- OSCP
- CHFI (Computer Hacking Forensic Investigator)
- ISO 270001 Lead Auditor
- ECSA (EC-Council Security Analyst)
- CEH (Certified Ethical Hacker)
- CCNA and CCNA Security
- CCNP Routing and CCNP Switching
- Advanced Linux&InfoSEC
- VMWare vSphere Install, Configure, Manage
- Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.
WordPress Hacking and Hardening in Simple Steps
Instructor: Gabriel Avramescu
- I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.
- Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking).
- Make recommendations on security weaknesses and report on activities and findings.
- Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated)
- Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment
- Perform analysis and testing to verify the strengths and weaknesses of Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.)
- Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures
- Assist with the development of remediation services for identified findings
- Customize, operate, audit, and maintain security related tools and applications
Learn Server Security With BitNinja
Instructor: Gabriel Avramescu
- We will start with an overview of a Wordpress Attack. We will scann a website hosted on Wordpress and exploit its vulnerabilities. Furthermore we will upload a backdoor so we can have remote access to the target server.
- Then we will dig in Bitninja. We will begin by installing and registering the product and see it's main features. We will talk then about proactive protection mechanisms such as IP Reputation, Port Honeypots, Web Honeypots, DoS Detection and WAF Modules.
- We will continue with reactive protection mechanisms such as Malware Detection, Outbound WAF and we will see bitninja-cli capabilities.
- Furthermore, we will find sources of an infection and spamming and source of outbound attacks.
- In the end we will learn about troubleshooting and how to find a trouble maker IP. I think you will enjoy all of this.
- Easy setup- Enjoy immediate protection on your server. BitNinja is designed to install and work with as little human interaction as possible. Run one line of code and your server is protected from 99% of attacks.
- All-in-one protection- BitNinja combines the most powerful server security software in one easy-to-use protection suite. You get full-stack protection against XSS, DDoS, malware, scans, script injection, enumeration, brute force and other automated attacks — on all major protocols, not only HTTP(S).
- Machine learning- Servers protected by BitNinja learn from each attack and inform each other about malicious IPs. This result is a global defense network that counteracts botnet attacks with a shield of protection for all servers running BitNinja, while also reducing the number of false positives each server encounters.
- I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.
- Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking).
- Make recommendations on security weaknesses and report on activities and findings.
- Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated)
- Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment
- Perform analysis and testing to verify the strengths and weaknesses of Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.)
- Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures
- Assist with the development of remediation services for identified findings
- Customize, operate, audit, and maintain security related tools and applications
- CEH, ECSA, CHFI from EC-Council
- Cisco CCNA, CCNA Security, Linux Essentials
- OSCE
- OSWE
- OSWP
- CREST Registered Penetration Tester (CRT)
- OSCP
- CHFI (Computer Hacking Forensic Investigator)
- ISO 270001 Lead Auditor
- ECSA (EC-Council Security Analyst)
- CEH (Certified Ethical Hacker)
- CCNA and CCNA Security
- CCNP Routing and CCNP Switching
- Advanced Linux&InfoSEC
- VMWare vSphere Install, Configure, Manage
- Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.
IT Security for Project Managers
Instructor: Frank Hissen
Secure Programming of Web Applications - Developers and TPMs
Instructor: Frank Hissen
The Complete Python Hacking Course: Beginner to Advanced
Instructor: Joseph Delgadillo
- Introduction and setup
- Port and vulnerability scanning
- SSH and FTP attacks
- Password cracking
- Sniffers, flooders and spoofers
- DNS spoofing
- Network analysis
- Coding a multi-functioning reverse shell
- Keyloggers
- Command and control center
- Website penetration testing
Learn Ethical Hacking: Beginner to Advanced!
Instructor: Joseph Delgadillo
- How to setup a Linux system
- Basic Unix system commands
- How to create a secure penetration testing environment
- Footprinting
- Scanning
- Website penetration testing
- WPA2 wireless network cracking
- Man in the middle attacks
- System hacking
- Python programming fundamentals
- Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer)
- Tips for building a career in cyber security
Certified Ethical Hacker Boot Camp
Instructor: Joseph Delgadillo
- 19+ Hours of HD Video
- Lessons on how to think like a hacker
- Live hacking demonstrations
- A blueprint for conducting your own penetration test
- Links to additional resources to continue your education
- 1 on 1 assistance from a certified ethical hacker
- Hacking terminology
- Passive & active reconnaissance
- Scanning & enumeration
- Network mapping
- Sniffing and spoofing
- Windows and Linux hacking
- Social engineering basics
- Credential harvesting
- Website cloning
- Anti-virus evasion
- Hacking demonstrations with tools such as
- Maltego, FOCA, Harvester, Recon-ng,Nmap, masscan, tcpdump, Wireshark, Ettercap, Burp Suite, Scapy, Mimikatz, Hashcat, Konboot, Hydra, and much more!
WordPress Security 2017: Secure Your Site Against Hackers!
Instructor: Rob Cubbon
- easily guessed or stolen usernames and password
- out of date software I show how to use secure and unguessable passwords that are different on every site. I continue to explain how to ensure all the software that’s used to run your site, not only the WordPress software, is not only up-to-date but kept up-to-date. We also cover home directory and webroot hygiene as well as disabling directory listing and error reporting.
- protect a site with a cloud-based firewall
- scan your site everyday for known vulnerabilities and changes in the WordPress code
- block malicious IPs and requests
- and much more I demonstrate how to set up and schedule back-ups. So if anything goes wrong in the future you can restore your site back to an early copy.
Java Cryptography Architecture: Secure Password Hashing
Instructor: Frank Hissen
File Encryption Basics and Practices with CrococryptFile
Instructor: Frank Hissen
Introduction to Encryption - Terminology and Technology
Instructor: Frank Hissen