Setting Up A Malware Analysis Lab

Udemy - Android Hacking And Penetration Testing [repost]  eBooks & eLearning

Posted by house23 at Jan. 8, 2017
Udemy - Android Hacking And Penetration Testing [repost]

Udemy - Android Hacking And Penetration Testing
MP4 | AVC 528kbps | English | 1280x720 | 30fps | 7h 50mins | AAC stereo 69kbps | 2.06 GB
Genre: Video Training

Android Hacking and Penetration Testing course is a highly practical and hands on video course. The course will focus on the tools and techniques for testing the Security of Android Mobile applications. During the course, You will learn various topics such as Android architecture, Android security model, Android Application Pentesting and Exploitation, Reversing Android applications, static and dynamic analysis of android malware etc. After finishing this course you will be able to perform a Penetration test on a given Android device and its applications.

Cyber Security Specialist Workshop  eBooks & eLearning

Posted by ELK1nG at Nov. 12, 2023
Cyber Security Specialist Workshop

Cyber Security Specialist Workshop
Published 11/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.94 GB | Duration: 7h 28m

Learn while working in real cybersecurity projects

Ethical Hacking Mastery: Cybersecurity & Pen Testing  eBooks & eLearning

Posted by ELK1nG at Oct. 11, 2023
Ethical Hacking Mastery: Cybersecurity & Pen Testing

Ethical Hacking Mastery: Cybersecurity & Pen Testing
Published 10/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 9.61 GB | Duration: 14h 39m

Become an Expert Ethical Hacker: Master Cybersecurity, Penetration Testing, and Vulnerability Assessment.
Cyber Forensics Up and Running: A hands-on guide to digital forensics tools and technique

Cyber Forensics up and Running
by Vashishth, Tarun;

English | 2024 | ISBN: 9355517181 | 414 pages | True EPUB | 25.35 MB
Binary Analysis Cookbook: Actionable recipes for disassembling and analyzing binaries for security risks

Binary Analysis Cookbook: Actionable recipes for disassembling and analyzing binaries for security risks by Michael Born
English | ISBN: 1789807603 | 396 pages | EPUB | September 20, 2019 | 6.32 Mb

Cybersecurity Essentials: Protect Your Digital World  eBooks & eLearning

Posted by ELK1nG at Aug. 16, 2024
Cybersecurity Essentials: Protect Your Digital World

Cybersecurity Essentials: Protect Your Digital World
Published 8/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 294.81 MB | Duration: 2h 6m

Master Cybersecurity: History, Threats, CIA Triad, and Best Practices for Digital Protection

Cybersecurity Essentials: Protect Your Digital World  eBooks & eLearning

Posted by ELK1nG at Aug. 16, 2024
Cybersecurity Essentials: Protect Your Digital World

Cybersecurity Essentials: Protect Your Digital World
Published 8/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 294.81 MB | Duration: 2h 6m

Master Cybersecurity: History, Threats, CIA Triad, and Best Practices for Digital Protection
CCIE/CCNP Security Exam 300-710: Securing Networks with Cisco Firepower (SNCF): Volume I

Todd Lammle, Donald Robb, "CCIE/CCNP Security Exam 300-710: Securing Networks with Cisco Firepower (SNCF): Volume I"
English | 2021 | ASIN: B0914PXCF4 | 657 pages | AZW3 / PDF | 206 MB

Ethical Hacking with Python: A Practical Guide  eBooks & eLearning

Posted by TiranaDok at Dec. 8, 2024
Ethical Hacking with Python: A Practical Guide

Ethical Hacking with Python: A Practical Guide by Laszlo Bocso
English | August 28, 2024 | ISBN: N/A | ASIN: B0DFMSHD78 | 247 pages | EPUB | 0.64 Mb

Soc(Cybersecurity):Build Your Own Soc With Open Source Tools  eBooks & eLearning

Posted by ELK1nG at Aug. 1, 2024
Soc(Cybersecurity):Build Your Own Soc With Open Source Tools

Soc(Cybersecurity):Build Your Own Soc With Open Source Tools
Published 8/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.59 GB | Duration: 7h 27m

Build a Powerful Cybersecurity-Security operation center (SOC) with TheHive, MISP, Elasticsearch, and Cortex