دسته: موسسه های دیگر

The topic of Hardware Hacking is one of the topics that is rarely addressed and mentioned in official courses, but nevertheless it is one of the most important techniques required for hackers who intend to carry out field and physical attacks. This package includes videos from conferences like DefCon on this topic, hands-on courses, lots of books, YouTube videos and blogs. In this course, you will learn a wide range of topics such as making (Rubber Ducky) BAD USB, FPGA attacks, security testing of switches and routers, Wifi jamming, direct attacks on Memory, attacks on Mouse, etc. This package includes more than 40 hours of educational videos and many books. To know the names of the courses and books in this package, you can watch the video of this article.

Complete Hardware Hacking Package

ادامه مطلب

The training course and certification exam were created under the supervision of our Academic Advisory Board, comprised of Senior Security Analysts, SOC Managers, and other senior security roles; ensuring it is accurate, realistic, and applicable to modern security operations.

Syllabus

Domain 1 – Security Fundamentals

Domain 2 – Phishing Analysis

Domain 3 – Threat Intelligence

Domain 4 – Digital Forensics

Domain 5 – SIEM

Domain 6 – Incident Response

BTL: Blue Team Level 1

ادامه مطلب

Reversing Hero course is a very good course for people who want to learn reverse engineering from beginner to intermediate level. This course consists of 12 hours of video, the degree of difficulty of which increases step by step, and also in the Reversing Hero course, you have to try to solve the given exercises by yourself, and if you are completely stuck, you can watch the video of the solution to the exercise.

Reversing Hero

ادامه مطلب

The RedTeam Blueprint course from RedTeam Nation is a very special course for people who want to start Red Team, APT or penetration testing. This course also teaches the basic topics related to hacking and security in the operating system as well as the network, and is completely suitable for people who do not have any background. Partners of this institute are SANS, Offensive Security and Microsoft.

Syllabus

  • The 3 Teams
  • Penetration Testing Process
  • The Windows Operating System
  • The Linux Operating System
  • Operating System Internals
  • Active Directory
  • Kerberos
  • Data Manipulation
  • Networking
  • VPN’s
  • Firewalls
  • Building a Firewall
  • Programs
  • Python
  • Assembly
  • Scope Identification
  • Reconnaissance
  • Exploitation
  • Post Exploitation
  • Password Cracking
  • Covering Your Tracks
  • Reporting
  • Attacking a Windows Domain
  • Job Hunting

Redteam Blueprint by Redteam Nation

ادامه مطلب

Maltego Essentials is the official video tutorial series that guides you through the basics of Maltego to help you kickstart your investigations. Watch these 10 bite-sized tutorials and quickly learn about the most important Maltego features now!

Syllabuss

1. Introducing The Official Maltego Video Tutorial Series

2. Editions of Maltego

3. How to Install and Activate Maltego

4. Running Your First Transform

5. How to Navigate your Graph

6. Different Layouts and Views of a Maltego Graph

7. What You Should Know About Entities in an Investigation

8. Notes, Bookmarks & Attachments

9. What Are Collection Nodes

10. How to Import Data into Maltego

Maltego Essentials Course

ادامه مطلب