In this course, we will look at how to exploit Simple Buffer Overflows on Win32 systems. This is an introductory course and starts from the very basics of exploitation and is beginner friendly. We will be taking over 10+ real[…]
Archive: October 2016
This course is ideal for penetration testers, security enthusiasts and network administrators. A non-exhaustive list of topics to be taught includes: Bypassing WLAN Authentication – Shared Key, MAC Filtering, Hidden SSIDs Cracking WLAN Encryption – WEP, WPA/WPA2 Personal and Enterprise[…]
This course is ideal for penetration testers, security enthusiasts and network administrators. A non-exhaustive list of topics to be taught includes: Metasploit Basics and Framework Organization Server and Client Side Exploitation Meterpreter – Extensions and Scripting Database Integration and Automated[…]
This course will familiarise students with all aspects of Linux forensics. By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, analyse filesystems, analyse network traffic, analyse files, perform[…]
In this course, we will be learning how to use Javascript for Pentesting.
This course focuses on teaching the basics of 64-bit assembly language for the x86_64 family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we will look at writing shellcode, encoders[…]
This course focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we will look at writing[…]
This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administrators who want to learn to automate tasks or go beyond just[…]
InfoSec talks: 2008 Computer science, Cyber Security and Management (CSM) – The MSc in Cyber Security and Management is designed for those wishing to develop a career as cyber security professionals, or to take a leading technical or managerial role in[…]
|--Although you should be able to work out who I am, I don't really care, as I can work out who you are. So beware of leaving footprints.--|







