Top

Blog Style 3

October 23 2016

This course will cover USB in detail with an emphasis on understanding USB Mass Storage devices (also known as flash drives or thumb drives).By the end of this course students will know how to sniff USB traffic using open source[…]

October 23 2016

In this course, we will look at how to exploit Simple Buffer Overflows on Win32 systems. This is an introductory course and starts from the very basics of exploitation and is beginner friendly. We will be taking over 10+ real[…]

October 23 2016

This course is ideal for penetration testers, security enthusiasts and network administrators. A non-exhaustive list of topics to be taught includes: Bypassing WLAN Authentication – Shared Key, MAC Filtering, Hidden SSIDs Cracking WLAN Encryption – WEP, WPA/WPA2 Personal and Enterprise[…]

October 23 2016

This course is ideal for penetration testers, security enthusiasts and network administrators. A non-exhaustive list of topics to be taught includes: Metasploit Basics and Framework Organization Server and Client Side Exploitation Meterpreter – Extensions and Scripting Database Integration and Automated[…]

October 23 2016

Linux Forensics

This course will familiarise students with all aspects of Linux forensics. By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, analyse filesystems, analyse network traffic, analyse files, perform[…]

October 23 2016

In this course, we will be learning how to use Javascript for Pentesting.

October 23 2016

This course focuses on teaching the basics of 64-bit assembly language for the x86_64 family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we will look at writing shellcode, encoders[…]

October 23 2016

This course focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we will look at writing[…]

October 23 2016

This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administrators who want to learn to automate tasks or go beyond just[…]

October 16 2016
1 6 7 8 9 10 12