Get $1 credit for every $25 spent!

2018 Supercharged Cybersecurity Bundle

Ending In:
Add to Cart - $29.99
Add to Cart ($29.99)
$635.90
95% off
wishlist
(102)
Courses
10
Enrolled
1,018

What's Included

Product Details

Kali Linux 2 Assuring Security by Penetration Testing

Achieve the Gold Standard in Penetration Testing Using Kali

By Packt Publishing | in Online Courses

In this course, you'll get a rock-solid insight into penetration testing techniques and learn how to test a corporate network against threats like never before. You'll formulate pentesting strategies by relying on the most up-to-date and feature-rich Kali Linux 2, thereby learning the cutting edge in pentesting tools.

  • Find out how to download & install your own copy of Kali Linux
  • Properly scope & conduct the intial stages of a penetration test
  • Conduct reconnaissance & enumeration of target networks
  • Exploit & gain a foothold on a target system or network
  • Obtain & crack passwords
  • Use the Kali Linux NetHunter install to conduct wireless penetration testing
  • Create proper penetration testing reports
Packt’s mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, it has published over 4,000 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done–whether that’s specific learning on an emerging technology or optimizing key skills in more established tools.

Details & Requirements

  • Length of access: lifetime
  • Access options: download for offline access
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Kali Linux 2 - Assuring Security by Penetration Testing - Third Edition
    • Kali Linux 2 - Assuring Security by Penetration Testing - Third Edition

View Full Curriculum


Kali Linux 2: Windows Penetration Testing

A Complete Pentesting Toolkit Facilitating Smooth Backtracking for Working Hackers

By Packt Publishing | in Online Courses

This book has the most advaned tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux. From being introduced to Kali's top tools to finding your way around your target network to proving that vulnerabilities are real and exploitable, this book will help you cover all the bases of modern pentesting.

  • Set up Kali Linux for pentesting
  • Map & enumerate your Windows network
  • Exploit several common Windows network vulnerabilities
  • Attack & defeat password schemes on Windows
  • Debug & reverse-engineer Windows programs
  • Recover lost files, investigate successful hacks & discover hidden data in innocent-looking files
  • Catch & hold admin rights on the network, and maintain backdoors on the network after your initial testing is done
Packt’s mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, it has published over 4,000 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done–whether that’s specific learning on an emerging technology or optimizing key skills in more established tools.

Details & Requirements

  • Length of access: lifetime
  • Access options: download for offline access
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Kali Linux 2: Windows Penetration Testing
    • Kali Linux 2: Windows Penetration Testing

View Full Curriculum


Mastering Kali Linux Wireless Pentesting

Test Your Wireless Network's Security & Master Advanced Wireless Penetration Techniques

By Packt Publishing | in Online Courses

Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. This book will take you on a journey where you'll learn to master advanced tools and techniques to conduct wireless penetration testing with Kali Linux. By the end of the book, you'll have mastered using Kali Linux for wireless security assessments and become a more effective penetration tester and consultant.

  • Fingerprint wireless networks w/ the various tools available in Kali Linux
  • Learn various techniques to exploit wireless access points using CSRF
  • Crack WPA/WPA2/WPS & crack wireless encryption using Rainbow tables more quickly
  • Perform man-in-the-middle attacks on wireless clients
  • Understand client-side attacks, browser exploits, Java vulnerabilities, & social engineering
  • Develop advanced sniffing & PCAP analysis skills to extract sensitive information such as DOC, XLS, and PDF documents from wireless networks
  • Use Raspberry PI & OpenWrt to perform advanced wireless attacks
  • Perform a DOS test using various techniques & tools
Packt’s mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, it has published over 4,000 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done–whether that’s specific learning on an emerging technology or optimizing key skills in more established tools.

Details & Requirements

  • Length of access: lifetime
  • Access options: download for offline access
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Mastering Kali Linux Wireless Pentesting
    • Mastering Kali Linux Wireless Pentesting

View Full Curriculum


Learning Python Web Penetration Testing

Make Your Applications Attack-Proof by Penetration Testing with Python

By Packt Publishing | in Online Courses

There are more web applications than ever these days and a greater need than ever to make them secure. Web penetration testing is the use of tools and code to attack a website or web app to assess its vulnerabilities to external threats. This course will walk you through the web application penetration testing methodology, showing you how to write your own tools with Python for every main activity in the process.

  • Get an overview of the web application penetration testing process & the tools used
  • Learn HTTP & how to interact w/ web applications using Python and the Requests library
  • Test tools against a vulnerable web application
Christian Martorella has been working in the field of Information Security for the last 16 years, and is currently working as Principal Program Manager in the Skype Product Security team at Microsoft. Christian's current focus is on software security and security automation in a Devops world.

Before this, he was the Practice Lead of Threat and Vulnerability for Verizon Business, where he led a team of consultants in delivering security testing services in EMEA for a wide range of industries including Financial Services, Telecommunications, Utilities, and Government.

Christian has been exposed to a wide array of technologies and industries, which has given him the opportunity to work in every possible area of IT security and from both sides of the fence, providing him with a unique set of skills and vision on Cyber Security.

He is the co-founder and an active member of Edge-Security team, who releases security tools and research. Christian has contributed to open source security testing and information gathering tools such as OWASP WebSlayer, Wfuzz, theHarvester, and Metagoofil, all included in Kali, the penetration testing Linux distribution.

Christian presented at Blackhat Arsenal USA, Hack.Lu, What The Hack!, NoConName, FIST Conferences, OWASP Summits, OWASP meetings (Spain, London, Portugal, and Venice), and Open Source Intelligence Conference (OSIRA). In the past, Christian has organized more than 20 FIST Conferences in Barcelona, providing a forum for professionals and amateurs interested in Security Testing. Christian holds a Master's degree in Business Administration from Warwick Business School, and multiple security certifications such as CISSP, CISM, CISA, OPSA, and OPST.

Details & Requirements

  • Length of access: lifetime
  • Access options: download for offline access
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Introduction
    • The Course Overview (5:58)
    • Understanding Web Application Penetration Testing Process (7:50)
    • Typical Web Application Toolkit (6:19)
    • Testing Environment (6:15)
  • Interacting with Web Applications
    • HTTP Protocol Basics (7:10)
    • Anatomy of an HTTP Request (7:56)
    • Interacting with Web Apps Using Requests Library (10:24)
    • Analyzing the Responses (7:22)
  • Web Crawling with Scrapy
    • Web Application Mapping (3:36)
    • Creating a Crawler with Scrapy (7:56)
    • Recursive Crawling (3:43)
    • Extracting Information (5:23)
  • Resources Discovery
    • What Is Resource Discovery? (4:02)
    • Building Our First Brute Forcer (5:25)
    • Analyzing the Results (5:17)
    • Adding More Information (3:54)
    • Taking Screenshots of the Findings (4:15)
  • Password Testing
    • How Password Attacks Work? (4:56)
    • Our First Password Brute Forcer (4:38)
    • Adding Support for Digest Authentication (4:43)
    • Form-based Authentication (7:08)
  • Detecting and Exploiting SQL Injection Vulnerabilities
    • SQL Injection Vulnerability (4:50)
    • Detecting SQL Injection Issues (8:09)
    • Exploiting a SQL Injection to Extract Data (6:00)
    • Advanced SQLi Exploiting (3:55)
  • Intercepting HTTP Requests
    • HTTP Proxy Anatomy (4:07)
    • Introduction to mitmproxy (3:53)
    • Manipulating HTTP Requests (6:53)
    • Automating SQLi in mitmproxy (4:38)
    • Wrapping Up (3:55)

View Full Curriculum


Expert Metasploit Penetration Testing

Enhance Your Knowledge of Penetration Testing Using Metasploit

By Packt Publishing | in Online Courses

If penetration testing is a battle then Metasploit is the deadliest and stealthiest weapon to use. Metasploit is a feature-rich tool that can be integrated with third-party tools easily. This course is a complete guide to numerous techniques using real-time demonstrations to sharpen your skills and give you a clear understanding of the complete framework.

  • Learn how to scan for vulnerabilities in the target or network
  • Build standalone payloads using msfencode
  • Exploit operating systems
  • Explain how Armitage can be used to leverage the powers of Metasploit over a GUI interface
Abhinav Singh is a young Information Security specialist from India. He has a keen interest in the field of hacking and network security and has adopted it as his full-time profession. He is also the author of Metasploit Penetration Testing Cookbook, Packt Publishing. He is an active contributor to the SecurityXploded community. Abhinav's works have been quoted in several security and technology magazines and portals.

Details & Requirements

  • Length of access: lifetime
  • Access options: download for offline access
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Getting Started with Scanning
    • Scanning with Nmap (3:36)
    • More Nmap Scan Options (3:57)
    • Working with a Database to Store Scan Results (3:15)
    • Scanning with Auxiliary Modules (3:15)
    • Vulnerability Scanning with NeXpose (3:18)
  • Working with Metasploit Payloads and Encoders
    • Working with msfpayload (3:18)
    • Working with msfencode (2:39)
    • Generating Complex Payloads (2:37)
    • Setting Up Metasploit Exploit Modules and Reverse Handlers (1:53)
    • Penetration Testing Using an Executable and Reverse Handler (2:11)
  • Working with Exploit Modules
    • WinXP SP2 Vulnerability Assessment and Exploitation (3:19)
    • Binding Shells and Changing Payloads (1:49)
    • Understanding the Metasploit Directory Structure (3:40)
    • Penetration Testing on a Linux Machine (3:17)
  • Client-side Exploitation Using Metasploit
    • Client-side Exploitation Based on Internet Explore (2:37)
    • Exploitation Module Based on Adobe Reader (2:54)
    • Exploitation and Pen-testing Based on a Java Applet (2:11)
    • Targeting the Microsoft File Format's Vulnerabilities for Penetration Testing (2:40)
    • Browser Autopwn (2:37)
  • Post-Exploitation with Meterpreter
    • Understanding Meterpreter (3:09)
    • Meterpreter System Commands (2:44)
    • Privilege Escalation Using Meterpreter (2:32)
    • Meterpreter File System Commands (1:54)
    • Meterpreter User Interface Commands (4:01)
  • Advanced Meterpreter
    • Passing the Hash (2:55)
    • Setting Up Persistent Connection Using Meterpreter (2:59)
    • Meterpreter Networking Commands (4:13)
    • Pivoting (3:46)
    • Railgun (2:35)
  • Working with Auxiliary Modules
    • Understanding the Module Directory Structure and Auxiliary Modules (3:12)
    • Working with Admin Auxiliary Modules (2:58)
    • Denial-of-service Auxiliary Modules (2:37)
    • Fuzzer Auxiliary Modules (2:33)
    • Post Exploitation Auxiliary Modules (2:22)
  • Working with Armitage
    • Getting Started with Armitage (2:07)
    • Understanding the Armitage GUI Interface (2:23)
    • Scanning with Armitage (2:39)
    • Launching Exploits against a Target Using Armitage (2:43)
    • Post Exploitation Using Armitage (3:10)

View Full Curriculum


Building Virtual Pentesting Labs for Advanced Penetration Testing

Learn How to Build Complex Virtual Architectures

By Packt Publishing | in Online Courses

Security flaws and new hacking techniques emerge practically overnight, and security professionals need to keep up. With this practical guide, you'll learn how to build your own virtual pentesting lab environments to practice and develop your security skills.

  • Learn proven security testing & penetration testing techniques
  • Build multi-layered complex architectures to test the latest network designs
  • Apply a professional testing methodology
  • Determine whether there are filters between you & the target and how to penetrate them
  • Deploy & find weaknesses in common firewall architectures
  • Learn advanced techniques to deploy against hardened environments
Packt’s mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, it has published over 4,000 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done–whether that’s specific learning on an emerging technology or optimizing key skills in more established tools.

Details & Requirements

  • Length of access: lifetime
  • Access options: download for offline access
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
    • Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition

View Full Curriculum


Practical Mobile Forensics

A Hands-On Guide to Master Mobile Forensics for iOS, Android & Windows Phone

By Packt Publishing | in Online Courses

Mobile phone forensics is the science of retrieving data from a mobile phone under forensically-sound conditions. In this book, you'll deep dive into mobile forensics techniques in iOS 8-9.2, Android 4.4-6, and Windows Phone devices. You'll learn the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively.

  • Discover the new features in practical mobile forensics
  • Understand the architecture & security mechanisms present in iOS and Android platforms
  • Identify sensitive files on the iOS & Android platforms
  • Set up the forensic environment
  • Extract & recover data on the iOS & Android platforms
  • Understand the forensics of Windows devices
  • Explore various third-party application techniques & data recovery techniques
Packt’s mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, it has published over 4,000 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done–whether that’s specific learning on an emerging technology or optimizing key skills in more established tools.

Details & Requirements

  • Length of access: lifetime
  • Access options: download for offline access
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Practical Mobile Forensics - Second Edition
    • Practical Mobile Forensics - Second Edition

View Full Curriculum


Learning Python for Forensics

Learn the Art of Designing, Developing & Deploying Innovative Forensic Solutions Through Python

By Packt Publishing | in Online Courses

This book will illustrate how and why you should learn Python to strengthen your analysis skills and efficiency as you creatively solve real-world problems. Each chapter walks you through a forensic artifact and one or more methods to analyze the evidence. With all this knowledge, you can rapidly develop and deploy solutions to identify critical information and fine-tune your skill set as an examiner.

  • Discover how to perform Python script development
  • Update yourself by learning the best practices in forensic programming
  • Build scripts through an iterative design
  • Explore the rapid development of specialized scripts
  • Understand how to leverage forensic libraries developed by the community
  • Conduct effective & efficient investigations through programmatic pre-analysis
  • Discover how to transform raw data into customized reports and visualizations
Packt’s mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, it has published over 4,000 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done–whether that’s specific learning on an emerging technology or optimizing key skills in more established tools.

Details & Requirements

  • Length of access: lifetime
  • Access options: download for offline access
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Learning Python for Forensics
    • Learning Python for Forensics

View Full Curriculum


Digital Forensics with Kali Linux

Simplify the Art of Digital Forensics & Analysis with Kali Linux

By Packt Publishing | in Online Courses

Kali Linux is the most comprehensive distribution for penetration testing and ethical hacking. This course teaches you all about the forensic analysis of computer and mobile devices that leverage the Kali Linux distribution. You'll get hands-on, seeing how to conduct each phase of the digital forensics process: acquisition, extraction, analysis, and presentation.

  • Learn how to use each tool to acquire images from the media to be analyzed
  • Discuss the Autopsy forensic suite & other specialized tools
  • Anaylze an Android device image using Autopsy
  • Cover file carving & the recovery of deleted data
Marco Alamanni has professional experience working as a Linux system administrator and Information Security analyst in banks and financial institutions.

He holds a BSc in Computer Science and an MSc in Information Security. His interests in information technology include ethical hacking, digital forensics, malware analysis, Linux, and programming, among other things. He also collaborates with IT magazines to write articles about Linux and IT security.

He has used Kali Linux on various occasions to conduct incident response and forensics in his professional activity, besides using it for penetration testing purposes. He is also the author of “Kali Linux Wireless Penetration Testing Essentials” published by Packt Publishing.

Details & Requirements

  • Length of access: lifetime
  • Access options: download for offline access
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Installation and Setup
    • The Course Overview (4:16)
    • Brief Introduction to Digital Forensics (6:35)
    • Downloading and Installing Kali Linux (6:25)
  • Acquiring Forensic Images
    • Introduction to Forensic Imaging (11:08)
    • Overview of dcfldd and dc3dd (5:02)
    • Drive Imaging with dc3dd (9:03)
    • Android Device Imaging with dc3dd (12:47)
    • Image Acquisition with Guymager (5:15)
  • Artifacts Extraction and Analysis with CLI Tools
    • Overview of the Sleuth Kit and Filesystem Analysis (13:15)
    • Windows Registry Analysis with RegRipper (9:26)
    • Extracting and Analyzing Browser, E-mail, and IM Artifacts (13:41)
    • File Analysis Tools (14:30)
    • Building a Super-Timeline of the Events (10:51)
  • File Carving and Data Recovery
    • File Carving Overview (7:07)
    • File Carving Tools (8:37)
    • Extracting Data with Bulk Extractor (5:04)
  • The Autopsy Forensic Suite
    • Autopsy 4 Overview and Installation (5:13)
    • Analysis of a Windows Image with Autopsy (10:47)
    • Analysis of an Android Image with Autopsy (4:55)
  • Memory Forensics
    • Introduction to Memory Forensics and Acquisition (4:03)
    • Memory Acquisition (4:07)
    • Introduction to Volatility (3:11)
    • Memory Analysis with Volatility (4:25)
  • Network Forensics
    • Introduction to Network Forensics (5:07)
    • Capturing Network Traffic with Wireshark (6:33)
    • Network Traffic Analysis with Wireshark (4:17)
  • Reporting
    • Introduction to Reporting (3:34)
    • Documentation and Reporting Tools (5:12)

View Full Curriculum


Network Analysis Using Wireshark 2

Secure Your Network with Ease by Leveraging Wireshark 2

By Packt Publishing | in Online Courses

Wireshark is a widely used open source tool to profile and monitor network traffic and analyze packets. It lets you control, capture, and dynamically browse the traffic running on the organization's network. This course will teach you about the new Wireshark 2, with enhanced features to help you protect your organization in a better way.

  • Brush up on the various network protocols, OSI layers, & the role of Wireshark
  • Install & configure Wireshark 2
  • Experience the rich new user interface
  • Focus on Wireshark's core functionalities like Packt Analysis, IP filtering, & Protocol filters
  • See how Wireshark 2 can be used to secure your network
  • Use Packet Analysis for security tasks, command-line utilities, & tools that manage trace files
Alex Kuzmenko (https://www.linkedin.com/in/kuzmenkoa), the author of this course, has more than 16 years of engineering hands-on experience in Telecom field. He has used Wireshark for mobile network integration, testing, and troubleshooting for more than 5 years in his job in Ericsson, North America. He also had 6 years of technical training experience preparing and conducting courses related to mobile packet networks in Europe and Asia.

Details & Requirements

  • Length of access: lifetime
  • Access options: download for offline access
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Getting Started with Wireshark v2.x
    • The Course Overview (3:53)
    • Protocol Analyzers (9:26)
    • Wireshark – Data Input (11:52)
    • Wireshark – Initial Settings (12:42)
    • Wireshark – GUI Interface (9:32)
    • Protocol Stack – Basics (7:29)
    • Protocol Stack – Basics (continued) (10:52)
    • Protocol Stack in Wireshark (10:17)
  • From Basics to Advanced
    • Display Filters (13:10)
    • Display Filters (Continued) (13:28)
    • Display Filters – Final Tuning (7:43)
    • Capture Filters (12:04)
    • Wireshark – Display Customizing (18:24)
    • Saving Traces (11:55)
    • Splitting/Merging Files (17:54)
  • Making Life Easier
    • Name Resolution (11:48)
    • Graphical Analysis (9:32)
    • Related Packets (4:21)
    • Useful Statistics (8:37)
    • Useful Statistics (Continued) (8:13)
    • If Wireshark Doesn't Decode! (6:58)
  • Network Troubleshooting
    • Troubleshooting Overview (5:46)
    • Issues with a Particular Service (12:18)
    • Low Performance (8:47)
    • Additional Help with Security (8:53)

View Full Curriculum



Terms

  • Instant digital redemption
×
Your Ad Blocker Is On!
Sadly, recent updates to your Ad Blocker are preventing crucial parts of our shop from loading. Frustrating. We know. We hate to nag, but please turn off your Ad Blocker or whitelist us to continue exploring our shop.