English | Size: 52.91 GB
Genre: eLearning
Here you will find all pentester academy courses till time of creation this topic
Javascript for Pentesters
In this course, we will be learning how to use Javascript for Pentesting.
Linux Forensics
This course will familiarize students with all aspects of Linux forensics. By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, ana…
USB Forensics and Pentesting
This course will cover USB in detail with an emphasis on understanding USB Mass Storage devices (also known as flash drives or thumb drives).By the end of this course students will know how to snif…
Pentesting iOS Applications
This course focuses on the iOS platform and application security and is ideal for pentesters, researchers and the casual iOS enthusiast who would like to dive deep and understand how to analyze and sy…
Make your own Hacker Gadget
All of us have heard about or used Hacker Gadgets like the WiFi Pineapple, Minipwner, Pwn Plug, R00tabaga etc. They are fantastic to use for demos, in social engineering tasks, explaining security imp…
Scripting Wi-Fi Pentesting Tools in Python
In this course we will learn how to create Wi-Fi Pentesting tools – sniffer and packet injectors using Python. We will look at both using libraries like scapy and working with raw sockets.
Web Application Pentesting
A non-exhaustive and continuously evolving list of topics to be covered include:
HTTP/HTTPS protocol basics
Understanding Web Application Architectures
Lab setup …
Network Pentesting
A non-exhaustive list of topics to be covered include:
Information Gathering – OSINT, DNS, SNMP etc.
Pentesting Network Components – Router, Switch, Firewall, IDS/IPS
…
Real World Pentesting
This video series covers the actual process of penetration testing. Learn all of the steps involved from finding a job as a penetration tester, scoping both a network and web application pentest pr…
Windows Forensics
This course will familiarize students with all aspects of Windows forensics.By the end of this course students will be able to perform live analysis, capture volatile data, make images of medi…
Android Security and Exploitation for Pentesters
Android Security and Exploitation for Pentesters is a course intended for people who want to get started into Android Security, or even who are a bit familiar with the Android security space but want …
Pentesting Android Apps – DIVA
DIVA is Damn Insecure and Vulnerable Application created by Aseem Jakhar, Payatu Labs. It contains various vulnerabilities including flaws in input validation, access control, hardcoding issues and…
Log File Analysis
This course teaches students how to analyse logs effectively using tools already available to you. The students will be taught how to analyse logs using Python, Powershell and Bash. Using real worl…
Reviews
There are no reviews yet.