Tag Archive: Hat

March 19, 2020   /   by Marco   /   , , , , , , , , , , , , ,

Callaway Tour Set: Hat, Clip, Par-Tees & Balls for $23

Callaway Tour Set: Hat, Clip, Par-Tees & Balls for $23

Expires March 01, 2120 23:59 PST Buy now and get 20% off KEY FEATURES The Callaway Tour Hat Gift Set is the perfect gift for any avid golfer. The high-quality, washed cotton canvas cap offers an unstructured low profile design and 30+ UV protection. With a built-in moisture-wicking headband, the cap helps keep sweat away […]

read more

June 21, 2018   /   by Marco   /   , , , , , , , , , , , , ,

Pay What You Want: The Ultimate White Hat Hacker 2018 Bundle for $1

Pay What You Want: The Ultimate White Hat Hacker 2018 Bundle for $1

Expires December 04, 2022 23:59 PST
Buy now and get 99% off

Cyber Security Volume II: Network Security

KEY FEATURES

Over this course you’ll learn network hacking techniques and vulnerability scanning to discover security risks across an entire network, learning skills for which companies are willing to pay top dollar. Whether you want to protect your own network or protect corporate networks professionally, this course will get you up to speed.

  • Access 106 lectures & 12.5 hours of content 24/7
  • Architect your network for maximum security & prevent local & remote attacks
  • Understand the various types of firewalls available, including layer 4 firewalls like Iptables & PF
  • Discuss firewalls on all platforms, including Windows, Mac OS, & Linux
  • Explore wireless security & learn how WiFi is hacked
  • Use tools like Wireshark, Tcpdump, & Syslog to monitor your network
  • Dive into search engine privacy & tracking, learning how to mitigate tracking & privacy issues

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK’s mobile banking and payment solutions helping secure to date over £71Bn in transactions.

His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan’s qualifications and education include:

  • BSc. (Hons) Computing ‘Networks & Communication’ 1st Class Honors
  • SCF : SABSA Charted Architect Foundation
  • CISSP : Certified Information Systems Security Professional
  • CISA : Certified Information Systems Auditor
  • CISM : Certified Information Security Manager
  • ISO 27001 Certified ISMS Lead Auditor
  • CEH : Certified Ethical Hacker
  • OSCP : Offensive Security Certified Professional

Learn Website Hacking and Penetration Testing From Scratch

KEY FEATURES

This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. As you gain a complex understanding of websites, you will then learn how you can exploit them to carry out a number of powerful cyber attacks. You’ll track from a beginning to advanced level and by the time you finish you’ll be able to launch attacks and test the security of websites and apps the same way that black hat hackers would, and be able to fix these vulnerabilities.

  • Access 93 lectures & 9 hours of content 24/7
  • Learn how to gather information about your target site like discovering the DNS server used & subdomains
  • Discover, exploit, & fix a number of vulnerabilities like file upload, code execution, SQL injection, XSS, & much more
  • Understand what you can do w/ the access gained from vulnerabilities
  • Explore the basic exploitation of attacks & the advanced methods to enhance them
  • Learn how & why vulnerabilities are exploitable, how to fix them, & the right practices to avoid them

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty, and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.

Ethical Hacking Using Kali Linux From A to Z

KEY FEATURES

To break into the world of professional penetration testing, you’ll need to be an ace with Kali Linux. This course will introduce you to the latest ethical hacking tools and techniques with Kali Linux, using a testing lab for practicing different types of attacks. Across the course, you’ll simulate an entire penetration test from beginning to end, giving you verifiable hands-on experience.

  • Access 80 lectures & 8.5 hours of content 24/7
  • Get comfortable w/ Kali Linux & learn the penetration testing phases
  • Manage Kali Linux HTTP & SSH services
  • Discover essential tools like Netcat & WireShark
  • Gather passive & active information
  • Explore how to perform & defend against a variety of attacks
  • Receive monthly virtual machines as a hacking challenge

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Learn Hacking Windows 10 Using Metasploit From Scratch

KEY FEATURES

In this beginner- and professional-friendly course, you’ll learn how black hat hackers hack Windows using advanced techniques, while improving your knowledge on how to analyze and secure Windows, and detect a hacker’s identity. Across the example-based course, you’ll get hands-on instruction in white hat hacking.

  • Access 81 lectures & 9 hours of content 24/7
  • Learn how to download & setup Kali Linux 2.0, Windows 10, & Metasploit as virtual machines
  • Understand how to gather as much info as possible from your target
  • Use msfconsole interface like a professional
  • Encode & combine the payload
  • Gain full access over a target OS & learn how to interact w/ it using Meterpreter command line
  • Perform various attacks over WAN network
  • Detect & protect from all of the attacks discussed

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Saad Sarraj has been an Ethical Hacker since 2012. He founded the website iSecurityPro and has been educating people in Linux and Windows security tips through his YouTube channel over that time. He is always focused on the practical side in his teaching, and the theory behind every attack.

Ethical Hacking for Beginners

KEY FEATURES

This course provides a good starting point from which to learn ethical hacking and identify threats and vulnerabilities to secure your IT environment. You’ll begin with an introduction to the best tools around before diving into basic hacking technique, and ultimately going into real-life scenarios to get a hang of how hackers think.

  • Access 14 lectures & 2 hours of content 24/7
  • Discuss a basic introduction to reconnaissance
  • Get hands-on experience working w/ Metasploit & testing the effectiveness of different defenses
  • Learn about sniffing & how effective Man-in-the-Middle attacks can be
  • Go through a coffee shop scenario to further your understanding
  • Understand how hackers use networks to gain access to different systems

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Gary Dewey is an IT consultant specializing in security. A graduate of SUNY Broome’s computer security and forensics degree program in New York, he has attended numerous B-Sides conferences and spoken at B-Sides in Rochester, New York. Gary participated in the 2015 US Cyber Challenge held at Virginia Tech. He is an active member of the Triple Cities Makerspace, a non-profit organization dedicated to community collaboration and learning. He enjoys hiking and cats.

Hack People, Systems and Mobile Devices

KEY FEATURES

To completely understand computer security, it’s vital to think outside the box. It’s not just about firewalls, Intrusion Prevention Systems, or antivirus. It’s also about tricking people into doing whatever a hacker wishes. A secure system, therefore, is also about informed people. This training is based on a practical approach of day-by-day situations contained labs based on real environments. The aim is to help you learn ethical hacking techniques and methodology used in penetration systems to better protect yourself and those around you.

  • Access 85 lectures & 12.5 hours of content 24/7
  • Cover both theoretical & practical aspects of ethical hacking
  • Work in hands-on labs about hacking systems, networks, wireless, mobile, & websites

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.

Web Application Penetration Testing Professional: WAPTP v3.1

KEY FEATURES

WAPTP v3.1 is a highly practical and hands-on training for web application penetration testing that covers the OWASP top 10 vulnerabilities. Starting with various terminologies of web technologies, you’ll build towards mapping an application for insecurities, and understanding how to identify and mitigate threats.

  • Access 64 lectures & 8 hours of content 24/7
  • Map an app for insecurities using various tools & tricks, including Burp Suite
  • Explore serious vulnerabilities like SQL injection, cross-site scripting, cross-site request forgery, XXE attacks, & more
  • Find & hunt each vulnerability through the points developers use to secure the web app at the time of development

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Atul Tiwari has more than 7 years of working experience in the information security field. He has trained more than 3,000 students in information security and penetration testing. With his expertise in web application penetration testing, Atul has performed penetration tests, security audits, and security analysis for private enterprise, governments, and security agencies to assist with cyber threats.

From Zero to Hero in Web, Network and WiFi Hacking

KEY FEATURES

This course aims to teach you in-depth WiFi hacking and security. Upon completion, you’ll be confident in breaking all types of WiFi encryption methods. Starting as a complete beginner with little to no knowledge of WiFi security and Kali Linux, you’ll learn the most important elements of WiFi hacking so you can begin applying them to a career in ethical hacking.

  • Access 118 lectures & 7 hours of content 24/7
  • Get an introduction to Kali Linux & network basics
  • Learn how to passively & actively gather information
  • Identify vulnerabilities in a target
  • Overrun buffer memory, perform password attacks, attack WiFi networks, & more
  • Discuss client side & server side web vulnerabilities
  • Test & exercise your defenses to ensure they’re up to task by simulating real-world attacks

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

LearnPentest is a group of penetration testers and ethical hackers with an extensive background in web application security, web and software development, network administration and exploit development. They have over 7 years of professional experience in the cyber security domain. Their instructors hold some of the most valuable certifications in the cyber security domain including: OSCP, LPT, C|EH, CISSP, OSCE.

read more

Pay What You Want: The Ultimate White Hat Hacker 2018 Bundle for $1

DO YOU LIKE WHAT YOU’VE READ?Join our subscription list and receive our content right in your mailbox. If you like to receive some Great deals our Freebies then subscribe now! Name Email

read more

June 23, 2017   /   by Marco   /   , , , , , , , , , , ,

Complete White Hat Hacking & Penetration Testing Bundle for $19

Complete White Hat Hacking & Penetration Testing Bundle for $19

Become a Computer Security Specialist & Start Your High-Paying Career with 16 Hours of Detailed Instruction
Expires December 10, 2017 23:59 PST
Buy now and get 97% off

Network Penetration Tester – Build a $120K/Year Career

KEY FEATURES

More and more companies are realizing that white hat hackers are essential to the safety of their data and networks. Exploit this desperate need by becoming a white hat hacker yourself, and finally getting the salary of your dreams. This course is the perfect introduction to the skills every white hat hacker needs to succeed. From hacking techniques and penetration testing to cryptography, you’ll gain the knowledge to protect any computer or network by course’s end.

  • Learn to think like a hacker in order to protect networks w/ over 36 lectures & 5 hours of content
  • Study hacking tools, methodologies & techniques
  • Follow along w/ real-life situational labs based on real environments.
  • Practice w/ included target virtual machines
  • Understand how to scan networks & exploit their vulnerabilities
  • Study system hacking, sniffing, Trojans, Backdoors, Viruses & Worms, cryptography, and more
  • Perform attacks using Metasploit
  • Learn how to perform penetration testing

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Basic IT skills suggested
  • Basic knowledge of Linux and/or Windows
  • Internet required

THE EXPERT

Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.

For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Basics of VMWare vSphere & ESXi Virtualization Software

KEY FEATURES

Any modern day network and security professional is obligated to be well-versed in cloud technology. This course will get you up to speed on virtualization and cloud technology, and even teach you to set up and maintain a virtual system from scratch. With this knowledge, you’ll be equipped to host anything from a few to hundreds of machines (even with varying operating systems) in one single infrastructure.

  • Get introduced to virtualization & cloud computing technology w/ over 24 lectures & 2.5 hours of content
  • Host hundreds of virtual machines running various operating systems
  • Link machines together in a virtual network or cloud infrastructure
  • Create a virtual system using the VMware VSphere environment
  • Understand, design & deploy a virtual system w/ ease
  • Learn to instal, deploy, manage & maintain a virtual system

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.

For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

How to Build a $120,000/Year Career as a Web Penetration Tester

KEY FEATURES

If you’re looking to build a career in security, there’s no better place to focus your efforts than penetration testing. By understanding the vulnerabilities and dangers presented by your network’s structure, you’ll learn how to remedy these gaps and save your company from major security breeches.

  • Master ethical hacking techniques used in penetration systems w/ over 22 lectures & 5.5 hours of content
  • Learn the basic methods for penetration testing of a web application
  • Go step-by-step through the entire penetration testing process
  • Control remote servers
  • Practice finding vulnerabilities in apps
  • Learn to gain information on potential targets
  • Study various attack types: authentication, session management, access controls, data stores, etc.

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Basic IT skills suggested
  • Basic knowledge of Linux and/or Windows
  • Internet required

THE EXPERT

Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.

For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Introduction to Cisco Packet Tracer Network Simulator

KEY FEATURES

The best way to learn the techniques of a Cisco network engineer—do it yourself. The Packet Tracer allows you to do just that by letting you create networks with almost an unlimited number of devices. You’ll learn to troubleshoot like a pro without needing access to Cisco routers and switches.

  • Master Cisco’s Packet Tracer network simulator w/ over 16 lectures & 1.5 hours of content
  • Develop Cisco-specific technology skills without access to official Cisco routers & switches
  • Download Packet Tracer for free w/ a Netacad account
  • Simulate complex scenarios before trying on real equipment
  • Connect & configure devices w/ the Command Line Interface

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Basic IT skills suggested
  • Basic knowledge of Linux and/or Windows
  • Internet required

THE EXPERT

Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.

For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Set Up Your Own Web Hosting Environment

KEY FEATURES

Whether you’re currently a web developer or hope to be one in the future, learning to host your own sites is an extremely valuable skill. This detailed course breaks down the process in just 1.5 hours, so you’ll have the skills of a Linux network professional without leaving your couch.

  • Learn to host a web page using a Linux box w/ over 15 lectures & 1.5 hours of content
  • Learn the basics of installing Linux OS
  • Understand DNS & how it works
  • Configure DNS/DDNS & Port forwarding from your router
  • Configure & secure Apache, PHP, MySQL & PHPMyAdmin
  • Study basic Wordpress setup
  • Set up a web hosting environment from scratch

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.

For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

read more

February 2, 2017   /   by Marco   /   , , , , , , , , , , , ,

CentOS & Red Hat Linux Certified System Administrator Course for $19

CentOS & Red Hat Linux Certified System Administrator Course for $19

Master Essential Linux Skills & Prepare to Pass the RedHat Certified System Administrator Exam
Expires June 07, 2021 23:59 PST
Buy now and get 90% off

KEY FEATURES

Start mastering Red Hat Linux and even prepare for the RedHat Certified System Administrator Exam (RHCSA) with this detailed course. Seeing as Linux powers most of the Web, every full stack hacker should be familiar with the operating system and its various tools. Even if you have zero Linux experience, you can count on this course to get you started with the basics, and move gradually into advanced material. You’ll see immediately why Linux is worth learning and using.

  • Master CentOS & Red Hat Linux w/ 74 lectures & 17+ hours of content
  • Get a basic familiarization with the graphic user interface
  • Learn the essentials & key functions to pass the RHCSA exam
  • Understand file system navigation & command lines
  • Experience the packet manager

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required
  • CentOS or Red Hat Enterprise Linux

THE EXPERT

Jerry Banfield has been an online entrepreneur since 2011, having served hundreds of clients in over 20 countries and managed billions of Facebook ads. He has learned how to drive large amounts of organic Google and YouTube traffic to his website, and teaches online courses sharing his experience with students worldwide. A member of the MENSAsociety, Jerry holds degrees from the University of South Carolina and the University of South Florida.

Ermin Kreponic is a strongly motivated young IT expert and Linux enthusiast with a passion for troubleshooting network-related problems. With an exceptional eye for details and a sense of urgency when it comes down to problem solving, Ermin is one of the top instructors in his field.

For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

read more

January 4, 2017   /   by Marco   /   , , , , , , , ,

Wireless Beanie Bluetooth Hat for $27

Wireless Beanie Bluetooth Hat for $27

Give Your Head a Melodic Warmth This Winter Season
Expires January 01, 2023 23:59 PST
Buy now and get 64% off

KEY FEATURES

Nothing is more important than a warm head in the winter! Except, of course, music, which is important at all times of years. Get both at the same time with this musical Bluetooth beanie, streaming music from your smartphone directly to your ears. You’ll actually look forward to walking outside in the next blizzard!

  • Streams crystal clear sound & protects you from windy weather at the same time
  • Lets you make & answer calls using the built-in mic
  • One size fits all

PRODUCT SPECS

Details & Requirements

  • Material: polyester
  • Size: 1 size fits all
  • Volume controls built-in

Compatibility

  • Apple Siri
  • Any Bluetooth-enabled device

Includes

  • 1 Wireless Musical Beanie Bluetooth Hat (black only)
read more

November 2, 2016   /   by Marco   /   , , , , , , , , , , ,

Certified White-Hat Hacker & Penetration Testing Course for $18

Certified White-Hat Hacker & Penetration Testing Course for $18

25 In-Depth Lectures: Think Like a Hacker to Prevent Security Vulnerabilities for a Living
Expires June 01, 2021 23:59 PST
Buy now and get 63% off

KEY FEATURES

With more evil hackers in cyberspace, more and more hero hackers are needed for protecting against potential attacks. Take the first step towards a lucrative and in-demand career–this course dives into recognizing network vulnerabilities and penetration testing to help you keep your website safe.

  • Over 24 lectures and 4.5 hours of content
  • Understand & apply concepts to hack systems and networks
  • Grasp the concept of security paradigms
  • Act as a security and penetration testing consultant
  • Study network attacking & web exploitation techniques
  • Master commonly used tools such as Metaspoilt, Scapy, and WireShark

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Compatibility

  • Internet browser required

THE EXPERT

Eduonix creates and distributes high-quality technology training content. Their team of industry professionals have been training manpower for more than a decade. They aim to teach technology the way it is used in the professional world, and have a professional team of trainers for technologies ranging from mobility to web and enterprise database and server administration.

For more details on this course and instructor, click here.

read more

November 2, 2016   /   by Marco   /   , , , , , , , , , , , ,

IT Security & White Hat Hacking: CompTIA & Cisco Certifications for $29

IT Security & White Hat Hacking: CompTIA & Cisco Certifications for $29

Access 50 Hours of Premium Instruction to Obtain 2 Industry-Recognized Certifications
Expires June 13, 2017 23:59 PST
Buy now and get 97% off

KEY FEATURES

Want to take your IT security career to the next level? Whether you’re a beginner or mid-level professional, you’ll want to take this comprehensive course. Get prepped to pass both the CompTIA Security+ and Cisco CCNA Security 210-260 IINS exams, and nab two certifications that will make your resume stand out. You’ll master mobile hacking, VPN technologies, penetration testing, and much more–giving you the knowledge you need to succeed in any IT workplace.

  • Access over 50 hours & 40 lectures of on-demand video training
  • Pass the CompTIA Security+ & Cisco CCNA Security certification exams
  • Master essential exam topics: cyber-security, ethical hacking, spyware & keyloggers, and more
  • Learn IT fundamentals applicable not just for your exams, but in the workplace
  • Supplement your lectures w/ resources: printable activities, review quizzes, etc.
  • Conveniently access course materials anywhere w/ the iOS app

PRODUCT SPECS

Details & Requirements:

  • Length of time users can access this course: 1 year
  • Access options: web streaming, mobile streaming, download for offline access
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility:

  • Internet required

THE EXPERT

LearnSmart has served the technology community with high-quality certification and skills training since 1997. It’s grown rapidly as a leading provider for individuals and corporations, serving clients from a broad range of Fortune 500 companies, as well as universities, government institutions and the armed forces. For more details on this course and instructor, click here.

read more

October 29, 2016   /   by Marco   /   , , , , , , , , , , , , ,

Pay What You Want: White Hat Hacker 2017 Bundle for $1

Pay What You Want: White Hat Hacker 2017 Bundle for $1

These 63 Hours of Training in the Most Up To Date Security Tools & Practices Can Earn You a New Career
Expires October 26, 2021 23:59 PST
Buy now and get 99% off

The Complete Ethical Hacking Course for 2016-2017

KEY FEATURES

The world of ethical hacking and network security is constantly changing, which is what makes this course, specifically built with the most up to date information, so valuable. Whether you’re completely new to ethical hacking, or just want to hone your skills with the newest technologies, this course will get you right up to speed with this exciting and lucrative career path.

  • Access 52 lectures & 9.5 hours of content 24/7
  • Get an introduction to ethical hacking
  • Learn Linux installation, terminal basics, & Wireshark setup
  • Understand how to stay anonymous online, how to use proxy servers, & how to access the dark web using TOR
  • Discover Aircrack-ng, HashCat, & WiFi hacking
  • Defend your own networks from attacks
  • Clone websites

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Ermin Kreponic is a strongly motivated young IT expert, Linux enthusiast with a passion for troubleshooting network related problems. He has an exceptional eye for details and a sense of urgency when it comes down to problem solving.

Python For Android Hacking Crash Course: Trojan Perspective

KEY FEATURES

Mobile security is of utmost importance, and developers will pay good money for pentesters who can identify security breaches in apps. In this course, you’ll learn how to use Python to build a Trojan for ethical hacking purposes. You’ll be able to discover flaws in Android security, and clean them up in one efficient swoop!

  • Access 26 lectures & 3.5 hours of content 24/7
  • Code a simple Android GUI interface w/ Python
  • Build a simple cross platform SSH botnet in Python
  • Create an SSH Android Trojan
  • Transfer & exfiltrate data out of a target device
  • Run Python SSH reverse shell on Windows, Linux, Android

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required
  • 4 GB RAM PC with Kali Linux Vbox
  • Android 4.2

THE EXPERT

Hussam Khrais is a senior security engineer with over 5 years in penetration testing, Python scripting and network security where he spends countless hours in forging custom hacking tools in Python.

Hussam currently holds the following certificates in information security:

  • GIAC Penetration Testing – GPEN
  • Certified Ethical Hacker – CEH
  • Cisco Certified Network Professional – Security (CCNP Security)

Learn Ethical Hacking From Scratch

KEY FEATURES

Interested in hacking for the good guys? This comprehensive course will take you from zero to hero in the field of ethical hacking, the career path where you get paid to expose system and network security threats. You’ll explore four main sections: network penetration testing, gaining access, post exploitation, and web app penetration testing to get a complete, well-rounded education in how to responsibly and effectively improve security.

  • Access 125 lectures & 11.5 hours of content 24/7
  • Learn basic network pentesting
  • Gather information about networks & computers, & learn how to gain access & attack targets
  • Understand how to gain full access to computer systems w/o user interaction
  • Create server side & client side attacks
  • Discover how to interact w/ the systems you’ve compromised
  • Learn how to detect, prevent, & secure your system & yourself from every attack you learn

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty, and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.

Networks From Scratch to Advanced Implementation

KEY FEATURES

Just about all professional organizations and homes have some kind of network connection these days. Obviously, this means there is a huge market for network administrators. In this comprehensive course, you’ll dive into networks, learning all you need to implement and maintain active networks in both corporate and personal environments. Soon enough, you’ll have the know-how to make (or save!) some dough by managing networks.

  • Access 65 lectures & 12 hours of content 24/7
  • Discuss different types of networks & IP protocols
  • Build a server client network from scratch
  • Configure DHCP, DNS, & file servers
  • Understand routing & switching networks
  • Explore common network attacks & network security concepts

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Certified Information Systems Security Professional

KEY FEATURES

The CISSP is an internationally recognized certification that demonstrates an IT professional’s technical and managerial competence to protect organizations from increasingly sophisticated attacks. It’s an ideal certification for anyone who wants to work in IT as it satisfies all government and professional security certification mandates and leaps out on a resume. In this course, you’ll receive in-depth instruction in all things CISSP, so you can be fully prepared when you decide it’s time to take the exam.

  • Access 68 lectures & 9.5 hours of content 24/7
  • Discuss penetration testing & information systems access control
  • Explore common security architecture frameworks
  • Understand different network types & topologies
  • Learn about cryptography, physical security, & operations security
  • Discuss the legal regulations & liability behind systems security

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

Compatibility

  • Internet required

THE EXPERT

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Information Security Management Fundamentals

KEY FEATURES

Dive into the fundamentals of information security and essential cyber security principles with this immersive course! The world is constantly interconnected by networks, and companies have a vested interest in keeping the information on those networks secure. Therefore, they’re willing to pay big bucks to information security professionals, and this course will teach you how to break into those elite ranks.

  • Access 74 lectures & 7.5 hours of content 24/7
  • Understand the fundamentals of information security management
  • Learn about hardening systems, basic network zones, IT personnel policies, & more
  • Discover disaster recovery basics
  • Discuss fundamental security threats, network security devices, access control concepts, & more
  • Better protect your business & IT infrastructure

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Compatibility

  • Internet required

THE EXPERT

Alton Hardin is an educator, poker coach, self-published & best-selling author, and full-time IT and Business professional. Alton is the founder of MicroGrinder Poker School and the best-selling author of Essential Poker Math for No Limit Holdem; moreover, he is the creator of numerous online poker courses. Alton has been playing poker for over a decade both live and online. He helped pay his way through college playing live low stakes games in the early 2000’s. Today, Alton enjoys playing the micro stakes for enjoyment and a teaching instrument, where he has racked up over $1,000 in earnings playing mainly 5nl & 10nl.

Outside of poker, Alton is a full-time business and IT professional, where he works in the field of cyber security. He has earned two graduate degrees, an M.B.A. and M.S. in IT Network Management; moreover, he currently holds multiple IT industry certifications.

Alton also has a fond love for teaching. As an undergraduate he group tutored chemistry students and as a graduate student he taught a GMAT prep course. Upon graduating from his MBA program, he began teaching as an adjunct professional for the School of Business & Public Administration at his local state university in the field of Information Systems and IT Management.

Web Security: Common Vulnerabilities & Their Mitigation

KEY FEATURES

The best way to protect yourself on the web is to actually learn how common attacks work so you can coat your online persona in a suit of armor. In this course, you’ll walk through a wide range of web app security attacks and learn the exact steps you can take to mitigate each. Plus, you’ll get the lowdown on how to adopt simple practices to keep yourself protected. By course’s end, you’ll be a security whiz.

  • Access 56 lectures & 8 hours of content 24/7
  • Understand how common web security attacks work
  • Learn how to write code to mitigate security risks
  • Implement secure coding practices to reduce vulnerabilities
  • Discuss security attacks like cross site scripting, session hijacking, credential management, SQL injection, & more

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels, but a basic understand of JavaScript and PHP is encouraged

Compatibility

  • Internet required

THE EXPERT

Loonycorn is comprised of four individuals—Janani Ravi, Vitthal Srinivasan, Swetha Kolalapudi and Navdeep Singh—who have honed their tech expertises at Google and Flipkart. The team believes it has distilled the instruction of complicated tech concepts into funny, practical, engaging courses, and is excited to be sharing its content with eager students.

Wi-Fi Hacking with Kali

KEY FEATURES

Network security is an essential to any home or corporate internet connection, which is why ethical hackers are paid big bucks to identify gaps and threats that can take a network down. In this course, you’ll learn how to protect WEP, WPA, and WPA2 networks by using Kali Linux, one of the most popular tools for ethical hackers. By course’s end, you’ll have the know-how to protect network environments like a pro.

  • Access 22 lectures & 1.5 hours of content 24/7
  • Set up a penetration testing environment
  • Learn 4 different ways to install & use Kali Linux
  • Understand how to hack WEP-protect WiFi & learn countermeasures
  • Discover how to hack WiFi using Hydra, a keylogger, or by removing devices

PRODUCT SPECS

Details & Requirements:

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Compatibility:

  • Internet required

THE EXPERT

Amit Huddar is an Internet Entrepreneur and Software Engineer. He runs his own software company “Softdust,” which develops products for new technologies like wearables and other gadgets. He opted for computer science engineering in 2013 at SSIT and started his software company in his first year of engineering.

His skills include: Android app development, HTML, CSS, PHP, C, C++, JAVA, Linux, Building Custom Linux OS, Cloud Computing. Penetration testing, Kali Linux and Hacking.

read more