Explore all library
1 to 24 of 48 results
Search results 1 - 24 of 48Category: Attack & Defence
- LEARNING PATHRichard BeckIntroduction to Ethical Hacking ToolsIntermediateDuration: Up to 19 hours and 28 minutesAuthor: Richard Beck; Difficulty: Intermediate; Description: This course has been designed to introduce you to a number of different ethical hacking tools.; Duration: Up to 19 hours and 28 minutes; Content Topics: Cyber Security, Security attacks, Security vulnerabilities, threats and countermeasures; This learning path has: 10 Courses, 9 Resources, 3 Exams, 15 Hands-on labs
- COURSERichard BeckTypes of Cyber Attacks and How to Prevent ThemBeginnerDuration: 49 minutes and 23 secondsAuthor: Richard Beck; Difficulty: Beginner; Duration: 49 minutes and 23 seconds; Content Topics: Cyber Security; This course has: 3 Lectures
- COURSENMAP Network Scanner: The BasicsBeginnerDuration: 5 minutes and 43 secondsDifficulty: Beginner; Duration: 5 minutes and 43 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSEKing SamuelFundamentals of Information Security Risk ManagementBeginnerDuration: 30 minutes and 40 secondsAuthor: King Samuel; Difficulty: Beginner; Duration: 30 minutes and 40 seconds; Content Topics: Risk Management; This course has: 4 Lectures
- HANDS-ON LABRichard BeckOWASP Exercises: SQL InjectionIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: This lab shows how to manage the security level of a DVWA application and how to perform a SQL injection to a DVWA application.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 7 Lab steps
- COURSEKing SamuelUnderstanding Cyberattacks and How to Counter ThemBeginnerDuration: 18 minutes and 3 secondsAuthor: King Samuel; Difficulty: Beginner; Duration: 18 minutes and 3 seconds; Content Topics: Cyber Security, Security vulnerabilities, threats and countermeasures; This course has: 4 Lectures
- HANDS-ON LABTiarnan GilesCloud Incident Response & Forensics: Foundation LabBeginnerDuration: Up to 1 hour and 10 minutesAuthor: Tiarnan Giles; Difficulty: Beginner; Description: In this lab, the second in the series, you will be performing further incident response and forensic analysis to determine what the attacker did within the container.; Duration: Up to 1 hour and 10 minutes; Content Topics: Security Investigations; This hands-on lab has: 6 Lab steps
- COURSEMetasploit Vulnerability Exploitation Tool: The BasicsBeginnerDuration: 5 minutes and 43 secondsDifficulty: Beginner; Duration: 5 minutes and 43 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSEQASQLmap SQL Injection Tool: The BasicsBeginnerDuration: 6 minutes and 44 secondsAuthor: QA; Difficulty: Beginner; Duration: 6 minutes and 44 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSENetcat Network Utility: The BasicsBeginnerDuration: 5 minutes and 26 secondsDifficulty: Beginner; Duration: 5 minutes and 26 seconds; Content Topics: Security; This course has: 1 Lecture
- HANDS-ON LABTiarnan GilesCloud Incident Response & Forensics: Intermediate LabIntermediateDuration: Up to 1 hour and 10 minutesAuthor: Tiarnan Giles; Difficulty: Intermediate; Description: In this lab, you will figure out what the attacker did in the host machine and generate a report which breaks down what happened.; Duration: Up to 1 hour and 10 minutes; Content Topics: Security Investigations; This hands-on lab has: 6 Lab steps
- HANDS-ON LABRichard BeckOWASP Exercises: Exploiting the Heartbleed BugIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: In this lab, you'll perform the Heartbleed attack using the MetaSploit Framework in order to dump the contents of a vulnerable webserver using an unpatched version of OpenSSL.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 7 Lab steps
- HANDS-ON LABLogan RakaiExecute a Reflected Cross-Site Scripting (XSS) AttackIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABLogan RakaiCracking Passwords in LinuxIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABTiarnan GilesCloud Incident Response & Forensics: Introductory LabBeginnerDuration: Up to 1 hour and 5 minutesAuthor: Tiarnan Giles; Difficulty: Beginner; Description: In this, the first lab in the series, you will be performing analysis on how the attacker gained access to the system.; Duration: Up to 1 hour and 5 minutes; Content Topics: Security Investigations; This hands-on lab has: 6 Lab steps
- HANDS-ON LABRichard BeckOWASP Exercises: Command ExecutionIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: This lab shows how to manage the security level of a DVWA application and how to perform a Command Execution attack from a DVWA application.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 4 Lab steps
- HANDS-ON LABLogan RakaiExecute a Stored Cross-Site Scripting (XSS) AttackIntermediateDuration: Up to 30 minutesAuthor: Logan Rakai; Difficulty: Intermediate; Duration: Up to 30 minutes; Content Topics: Security; This hands-on lab has: 2 Lab steps
- COURSENikto Web App Scanner: The BasicsBeginnerDuration: 3 minutes and 21 secondsDifficulty: Beginner; Duration: 3 minutes and 21 seconds; Content Topics: Security; This course has: 1 Lecture
- HANDS-ON LABRichard BeckOWASP Exercises: Cross-Site Scripting AttackIntermediateDuration: Up to 1 hourAuthor: Richard Beck; Difficulty: Intermediate; Description: In this lab, you'll learn how to navigate through DVWA to perform an XSS attack to retrieve a session cookie.; Duration: Up to 1 hour; Content Topics: Security attacks; This hands-on lab has: 6 Lab steps
- HANDS-ON LABQAConfiguring IPsec on a Windows 2016 ServerIntermediateDuration: Up to 4 hoursAuthor: QA; Difficulty: Intermediate; Description: Learn how to configure a Windows 2016 server to use IPsec to connect securely to a domain using the Domain Controller (DC) as a VPN anchor point.; Duration: Up to 4 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- HANDS-ON LABQACracking Hashes with John the RipperIntermediateDuration: Up to 2 hoursAuthor: QA; Difficulty: Intermediate; Description: This lab demonstrates how compromised hashes can be cracked using John the Ripper.; Duration: Up to 2 hours; Content Topics: Cyber Security; This hands-on lab has: 2 Lab steps
- COURSEBurpsuite Web App Proxy: The BasicsBeginnerDuration: 7 minutes and 42 secondsDifficulty: Beginner; Duration: 7 minutes and 42 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSEDirBuster Vulnerability Scanner: The BasicsBeginnerDuration: 2 minutes and 47 secondsDifficulty: Beginner; Duration: 2 minutes and 47 seconds; Content Topics: Security; This course has: 1 Lecture
- COURSEDroopescan Vulnerability Exploitation Tool: The BasicsBeginnerDuration: 2 minutes and 21 secondsDifficulty: Beginner; Duration: 2 minutes and 21 seconds; Content Topics: Security; This course has: 1 Lecture