Ethical Hacking
Showing 85–96 of 108 results
Scripting for Security with Bash
Bash is the GNU Project’s shell for command execution, scripting, and automation. This course will teach you how to use Bash and Linux commands for security management.
Sniffing and Spoofing with Kali Linux
Having access to an internal network can provide a wealth of information, if you know how to look for it. This course will teach you Sniffing and Spoofing techniques using Ettercap and TCPDump.
Social Engineering: Executive Briefing
Social engineering poses a potential threat to not only employees at an organization, but also directly to company executives. In this executive briefing, we will look at understand what social engineering and how you can protect yourself from it.
Specialized Attacks: Hardware Product Testing
This course will teach you to access firmware, analyze it and then reverse engineer it to identify weaknesses and vulnerabilities in the device.
Specialized Attacks: Wireless
This course will teach you to identify the vectors and techniques used by threat actors to gain access to networks and systems via wireless technologies.
Specialized Hunts: Threat Hunting within Mail Servers
This course will teach you how you can perform threat hunting analysis on email servers.
Specialized Testing: XSS
Since the late 1990s, cross-site scripting (XSS) has been one of the most common security issues in web applications. This course will teach you how to test a site for this kind of vulnerability.
Supply Chain Risk Management with OWASP Dependency-Check
Software supply chain risks are a huge security concern today and automated tools are essential to mitigate this threat. In this course, you will learn how to manage this risk by setting up OWASP Dependency-Check scanning on a software project.
Talking Tradecraft @ Pluralsight: A Technical Dive into the Log4Shell Exploit
This course is a technical post-mortem of the Log4Shell vulnerability, discussing the impact that has been seen to date, new developments in the remediation, and what to expect in the future.
Tech Ethics: Executive Briefing
You may have heard of technology ethics, now is your chance to practice it. This course will teach you practical methods of ensuring that tech ethics makes its way into your products and cultures.
Technical Information Gathering with Maltego CE 4
One of the most important phases in a red team engagement is the information gathering prior to the attack. In this course, we explore the Maltego CE tool, which will help you to collect technical and people information from your target.
Technical Information Gathering with theHarvester
The first and most important part of a red team engagement is reconnaissance. In this course, you will learn to gather technical information such as DNS subdomains and IP addresses, as well as people information, using theHarvester.