Top

Category: Course

2016
23 Oct

This course is ideal for penetration testers, security enthusiasts and network administrators. A non-exhaustive list of topics to be taught includes: Bypassing WLAN Authentication – Shared Key, MAC Filtering, Hidden SSIDs Cracking WLAN Encryption – WEP, WPA/WPA2 Personal and Enterprise[…]

23 Oct

This course is ideal for penetration testers, security enthusiasts and network administrators. A non-exhaustive list of topics to be taught includes: Metasploit Basics and Framework Organization Server and Client Side Exploitation Meterpreter – Extensions and Scripting Database Integration and Automated[…]

23 Oct

Linux Forensics

This course will familiarise students with all aspects of Linux forensics. By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, analyse filesystems, analyse network traffic, analyse files, perform[…]

23 Oct

In this course, we will be learning how to use Javascript for Pentesting.

23 Oct

This course focuses on teaching the basics of 64-bit assembly language for the x86_64 family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we will look at writing shellcode, encoders[…]

23 Oct

This course focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we will look at writing[…]

23 Oct

This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administrators who want to learn to automate tasks or go beyond just[…]

End