Ethical Hacking
Showing 97–108 of 108 results
Technical Weakness Identification with Nikto 2
This course will help you learn to identify web server misconfigurations and vulnerabilities with Nikto.
Testing Security Controls and Detecting Vulnerabilities with Nmap 7
This course will help you will learn how to leverage the capabilities of Nmap to find insecure applications and explore the weaknesses in your organization’s firewalls.
The Hacker Hippocampus
How does our brain process gamification and threats as hackers? This talk shares the answer.
Threat Hunt with IBM Security QRadar
The threat hunter is responsible for investigating malicious activity on the environment and detecting advanced persistent threats (APTs). This course will teach you how to hunt for threats using the IBM Security QRadar SIEM.
Threat Hunting: Hypothesize and Plan
Being responsible for finding malicious anomalies within an environment can be a daunting task. This course will teach you about different methodologies for threat hunting, and how to take action on indicators provided through threat intelligence.
Web App Hacking: Hacking Authentication
This course helps to understand different types of vulnerabilities in an authentication mechanism. You'll learn how to test web applications for various authentication flaws and how to provide countermeasures for these problems.
Web App Hacking: Hacking XML Processing
This course helps to understand different types of vulnerabilities in XML processing. You'll learn how to test web applications for various XML processing flaws and how to provide countermeasures for these problems.
Web Application Analysis with Kali Linux
Learn all about using several tools on Kali to analyze web applications for vulnerabilities. This course will teach you how to install, configure, and use several web application vulnerability tools on Kali Linux.
Web Application Pen Testing with Python
When using tooling and scripting efficiently, one can improve the results of web application pentests. This course will teach you how to automate several web application steps using Python.
Web Application Penetration Testing with Burp Suite
Want to learn how to use Burp beyond just the capture of requests and responses? This course helps get you up and running quickly to take advantage of all the functionality in the Burp Suite.
Writing Burp Suite Macros and Plugins
Learn how to write Burp Suite macros and extensions in different languages. Understand the Burp API, its supporting classes and structure in order to equip yourself in writing customized Burp functionality for your developer and pentester needs.
Writing Snort 3 Rules
Snort is an open source network intrusion detection system and intrusion prevention system. This course will teach you how to write your own custom rules in Snort to detect specific traffic.