This course is ideal for penetration testers, security enthusiasts and network administrators. A non-exhaustive list of topics to be taught includes: Bypassing WLAN Authentication – Shared Key, MAC Filtering, Hidden SSIDs Cracking WLAN Encryption – WEP, WPA/WPA2 Personal and Enterprise[…]
Category: Course
This course is ideal for penetration testers, security enthusiasts and network administrators. A non-exhaustive list of topics to be taught includes: Metasploit Basics and Framework Organization Server and Client Side Exploitation Meterpreter – Extensions and Scripting Database Integration and Automated[…]
This course will familiarise students with all aspects of Linux forensics. By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, analyse filesystems, analyse network traffic, analyse files, perform[…]
In this course, we will be learning how to use Javascript for Pentesting.
This course focuses on teaching the basics of 64-bit assembly language for the x86_64 family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we will look at writing shellcode, encoders[…]
This course focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we will look at writing[…]
This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administrators who want to learn to automate tasks or go beyond just[…]
|--Although you should be able to work out who I am, I don't really care, as I can work out who you are. So beware of leaving footprints.--|






