Ethical Hacking
Showing 37–48 of 108 results
Ethical Hacking: Understanding Ethical Hacking
A Certified Ethical Hacker is a security professional who understands how to look for weaknesses in target systems and uses the same knowledge and tools as a malicious hacker. This course will teach you the foundations of this knowledge needed for the CEH 312-50 exam.
Ethical Hacking: Vulnerability Analysis
Vulnerability assessment plays a major role in providing security to any organization’s resources and infrastructure from various internal and external threats. This course will teach you vulnerability analysis techniques needed for the Certified Ethical Hackers exam
Ethical Hacking: Web Application Hacking
Want to learn more about hacking web servers, web applications, and performing SQL injection attacks? This course will teach you all about web application hacking needed for the CEH exam
Exfiltration with Dnscat2
Maintaining access into a targeted network requires multiple C2 channels. In this course, you will learn data exfiltration using dnscat.
Exploitation with Kali Linux
Kali contains an array of tools to assist with security assessments and penetration tests. This course will teach you how to use some of those tools to exploit the systems you find, moving you into a position to perform post exploitation tasks.
Exploitation with PowerShell
Learning about PowerShell exploitation techniques and tools is of vital importance for successfully running red team operations or penetration tests in Windows environments.
GDPR and Privacy Compliance in Salesforce Marketing Cloud
Managing your contacts effectively has grown in importance with the GDPR setting a new standard for data protection. This course will teach you how to manage consent, limit data retention and honor delete requests in Marketing Cloud.
Getting Started with Nmap 7
Testing network security controls and discovering vulnerabilities are important parts of any organization's security plan. This course will help you learn how to use Nmap to discover network hosts and potential vulnerabilities.
Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing
The OWASP Zed Attack Proxy is an open source way of testing your web applications manually. This course walks through the basic functions of ZAP, giving you a look at ways this tool makes taking advantage of web application vulnerabilities possible.
Getting Started with Snort 3
In Getting Started with Snort, you will go from never before having operated Snort, to comfortably starting it from the command line and expanding its functionality through additional plugins.
Ghidra Concepts and Basic Functionality
At the core of every reverse engineers toolkit is a tool that disassembles or decompiles machine code. This course will teach you everything you need to know to get started with Ghidra, a free and open source suite of reverse engineering tools.
Hack Yourself First: How to go on the Cyber-Offense
"Hack Yourself First" is all about developers building up cyber-offense skills and proactively seeking out security vulnerabilities in their own websites before an attacker does.