2015-12-09

Master Penetration Testing with 7 Courses (60+ Hours) on Hacking Node.js Apps, Windows OS, Wi-Fi Devices & More

Expires March 08, 2016 23:59 PST

Buy now and get 99% off

The Complete Hacking Course: Go from Beginner to Advanced!



KEY FEATURES
This course is your introduction to white hat hacking, or testing methodologies designed to safeguard against security threats on a system. You'll learn to think and act like a malicious hacker, preemptively launching attacks they may perpetuate in order to prevent them. By mastering penetration testing techniques like attacking routers and cracking passwords, you'll not only learn how to identify security vulnerabilities--you'll learn a skill set coveted by many employers.

Master penetration testing & ethical hacking w/ over 25 hours of training and 108 lectures

Gain a valuable skill set to help companies test & enhance network security

Penetrate networks, exploit systems, break into computers & compromise routers

Understand key hacking concepts like white hat, gray hat & black hat hacking

Build your hacking environment by installing VirtualBox, setting up Kali Linux, etc.

Easily navigate the Linux terminal

Use Tor, ProxyChains & VPNs to stay anonymous and keep your activities covert

Steal data, attack routers, use SQL injections, etc.

Crack passwords, execute DoS attacks, gain remote control of devices & more

COMPATIBILITY

Internet required

PRODUCT SPECS

Length of time users can access this course: lifetime access

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: all levels

THE EXPERT
Jerry Banfield has been an online entrepreneur since 2011, having served hundreds of clients in over 20 countries and managed billions of Facebook ads. He has learned how to drive large amounts of organic Google and YouTube traffic to his website, and teaches online courses sharing his experience with students worldwide. A member of the MENSA society, Jerry holds degrees from the University of South Carolina and the University of South Florida. For more details on the course and instructor, click here.

This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Learn Wi-Fi Hacking/Penetration Testing From Scratch



KEY FEATURES
Deep dive into penetration testing techniques designed to expose a Wi-Fi system's security weaknesses, helping you address them before external threats can target them. You'll learn how wired networks function and execute practical attacks against them, including creating fake access points, executing fragmentation attacks, and much more.

Master wi-fi hacking & penetration testing techniques w/ over 50 videos of instruction and 5 hours of content

Execute practical attacks against any wireless enabled device

Install Kali Linux & connect your Wi-Fi card to a virtual machine

Understand network concepts such as MAC addresses & wireless modes

Execute pre-connection attacks, gain network access & launch post connection attacks

Gather data w/ your wi-fi card, create a fake access point to attract users & more

Crack WEP/WPA/WPA2 encryption w/ fake authentication, fragmentation attacks, etc.

Use Netdiscover to find connected clients, gather info w/ Autoscan, etc.

COMPATIBILITY

Internet required

PRODUCT SPECS

Length of time users can access this course: lifetime access

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: beginner

THE EXPERT
Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty, and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation. For more details on the course and instructor, click here.

This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Windows Exploit Development Megaprimer



KEY FEATURES
This course packs a punch for anyone interested in shoring up security for the latest Windows operating systems. You'll master effective penetration testing techniques including using debuggers, writing shellcodes, and creating exploits using the Egg Hunter program--invaluable knowledge for anyone who's a pentester by profession or personally interested in learning more about exploit development.

Learn different techniques for exploiting the Windows platform w/ over 15 lectures & 4 hours of content

Understand the protection mechanism of operating systems & bypass them

Write & execute exploits for the latest Windows operating systems

Read, comprehend & modify existing exploits

Learn stack based buffer overflow, write shellcodes & bypass memory protections

Use tools like debuggers, the Mona extension & more to execute exploit development

Learn advanced exploit development techniques: use Egg Hunter to write an exploit, bypass DEP using ROP Chains & more

Accrue an in-demand skill set for a career in pentesting, network administration, etc.

COMPATIBILITY

Internet required

Working knowledge of Windows & Linux OS

Knowledge of scripting languages: Python, Perl, Ruby, etc.

Familiarity w/ command-line utilities

Knowledge of Assembly language basics

PRODUCT SPECS

Length of time users can access this course: lifetime access

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: beginner

THE EXPERT
Ajin Abraham is an Application Security Engineer with 5+ years of experience, including 2 years of Security Research. He is passionate about developing new, unique security tools instead of using existing, potentially unreliable tools available today. Some of his hacking contributions include the OWASP Xenotix XSS Exploit Framework, Mobile Security Framework (MobSF), and Xenotix xBOT. He has also been invited to speak at notable security conferences, including ClubHack, NULLCON, OWASP AppSec AsiaPac, BlackHat Europe, and more. For more details on the course and instructor, click here.

This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Intensive Ethical Hacking Series

KEY FEATURES
Take another step closer towards an ethical hacking career by augmenting your pentesting knowledge with key techniques. You'll start by learning about networking concepts such as how protocols work, then master practical techniques such as using the Metasploit pentesting tool and bypassing Windows authentication schemas. By applying this theory to real-life scenarios throughout your lessons, you're certain to become a full-fledged ethical hacker in no time.

Learn to protect websites by understanding how attackers exploit them w/ 8 hours of content & 55 lectures

Set up your hacking environment: install VMware, Kali Linux, etc.

Understand networking concepts: protocols, Domain Name Systems & TCPs

Learn & apply key cryptography concepts

Conceal your activities using proxy servers & VPNs

Utilize the Metasploit pentesting tool to find & manage security issues

Learn about dangerous viruses such as remote access trojans & ransomwares

Hack Windows systems: bypass authentication schemas, create backdoors, etc.

Execute password attacks & breach firewalls

COMPATIBILITY

Internet required

PRODUCT SPECS

Length of time users can access this course: lifetime access

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: beginner

THE EXPERT
Zeal Vora works as a Cloud Security Engineer, and his domain of expertise lies in Linux & Information Security. He holds many professional certifications, including Certified Ethical Hacker, RedHat Certified Engineer, VMware Certified Associate for Cloud Computing, Data Center Virtualization, Workforce Mobility. Additionally, one of his passions is teaching, and he enjoys passing on his experience to other people, including through this online tutorial. For more details on the course and instructor, click here.

This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Ultimate Wi-Fi Hacking & Security Series

KEY FEATURES
Get another comprehensive look at security threats that may endanger wireless networks, and learn how to address them. Whether seeking to fortify home or corporate networks, you'll learn key techniques to help you address the security challenges of various wireless technologies, including but not limited to hacking SSIDs, deploying fake Wi-Fi devices, and much more.

Understand the security challenges of various wireless technologies w/ 4 hours of instruction & 24 lectures

Comprehend wireless security threats from an attacker’s perspective

Identify & neutralize threats that expose wireless technology

Learn how to attack WEP, WPA/WPA2, WPS & other systems

Hack hidden SSIDs & MAC filters

Create & deploy fake Wi-Fi devices, deploy a Wi-Fi jammer, etc.

Learn about coming developments in Wi-Fi security

COMPATIBILITY

Internet required

PRODUCT SPECS

Length of time users can access this course: lifetime access

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: beginner

THE EXPERT
Zeal Vora works as a Cloud Security Engineer, and his domain of expertise lies in Linux & Information Security. He holds many professional certifications, including Certified Ethical Hacker, RedHat Certified Engineer, VMware Certified Associate for Cloud Computing, Data Center Virtualization, Workforce Mobility. Additionally, one of his passions is teaching, and he enjoys passing on his experience to other people, including through this online tutorial. For more details on the course and instructor, click here.

This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Node.js Security: Pentesting & Exploitation

KEY FEATURES
A useful platform for building fast and scalable network apps, Node.js is enjoying widespread adoption by organizations everywhere. Therefore, it's imperative for developers to familiarize themselves with the security issues underlying Node.js apps. Start with this course: you'll learn a variety of pentesting and exploit development tools, such as how to execute a code review, implement secure code, and more.

Learn about & identify various Node.js security issues w/ 2 hours of content and 14 lectures

Understand the role of information disclosure in Node.js web apps

Execute code reviews of Node.js apps to secure them

Master use of the security analysis tool NodeJsScan

Address the vulnerabilities of insecure code

Add valuable skills to your pentesting arsenal

COMPATIBILITY

Internet required

PRODUCT SPECS

Length of time users can access this course: lifetime access

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: all levels

THE EXPERT
Ajin Abraham is an Application Security Engineer with 5+ years of experience, including 2 years of Security Research. He is passionate about developing new, unique security tools instead of using existing, potentially unreliable tools available today. Some of his hacking contributions include the OWASP Xenotix XSS Exploit Framework, Mobile Security Framework (MobSF), and Xenotix xBOT. He has also been invited to speak at notable security conferences, including ClubHack, NULLCON, OWASP AppSec AsiaPac, BlackHat Europe, and more. For more details on the course and instructor, click here.

This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Cross Site Scripting (XSS) Attacks for Pentesters

KEY FEATURES
Finish up your pentesting journey by learning about Cross Site Scripting, or XSS. It's a computer security vulnerability that enables attackers to inject malicious script into Web apps to steal data and violate user privacy. You'll learn the theory behind how XSS functions, then practical XSS mitigation techniques you can apply to guard against attacks like keylogging, phishing, reverse TCP shell attacks, and much more.

Understand what XSS is & why it's important to address this common security vulnerability w/ 2 hours, 16 hours of content

Learn about different types of XSS: Reflected, Stored, DOM & more

Comprehend the different sources from which XSS originates

Understand the different contexts in XSS: HTML, attribute, etc.

Exploit XSS w/ the OWASP Xenotix XSS Exploit Framework

Master how to implement XSS protection

COMPATIBILITY

Internet required

PRODUCT SPECS

Length of time users can access this course: lifetime access

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: all levels

THE EXPERT
Ajin Abraham is an Application Security Engineer with 5+ years of experience, including 2 years of Security Research. He is passionate about developing new, unique security tools instead of using existing, potentially unreliable tools available today. Some of his hacking contributions include the OWASP Xenotix XSS Exploit Framework, Mobile Security Framework (MobSF), and Xenotix xBOT. He has also been invited to speak at notable security conferences, including ClubHack, NULLCON, OWASP AppSec AsiaPac, BlackHat Europe, and more. For more details on the course and instructor, click here.

This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Show more