BackTrack 5 Wireless Penetration Testing

BackTrack 5 Wireless Penetration Testing
English | Size: 531.51 MB
Category: Tutorial


Wi-Fi is a popular technology that helps satisfy our need for continuous connectivity with some inherent security risks and vulnerabilities. In a society with an increasing level of discoveable Wi-Fi networks, wireless penetration testing allows you to verify whether your own networks are as secure as you’d like them to be.
[Read more…]

Software Testing Learn Manual Testing

Software Testing Learn Manual Testing
English | Size: 1.09 GB
Category: Tutorial


01 Before we begin
02 Career in Software Testing Industry
03 Fundamentals of Testing
04 Development Models
05 Forms of Testing
06 Levels of Testing
[Read more…]

Penetration testing part2

Penetration testing part2
English | Size: 2.47 GB
Category: HACKING


Every iPhone has an associated unique device Identifier derived from a set of hardware attributes called UDID. UDID is burned into the device and one cannot remove or change it. However, it can be spoofed with the help of tools like UDID Faker.
UDID of the latest iPhone is computed with the formula given below –
UDID = SHA1(Serial Number + ECID + LOWERCASE (WiFi Address) + LOWERCASE(Bluetooth Address))
[Read more…]

Penetration testing part1

Penetration testing part1
English | Size: 2.1 GB
Category: HACKING


Penetration testing (also known as pen testing) is the way that companies and organisations simulate attacks like real intruders on their infrastructure, systems and people. Many organisations follow different methodologies to carry out penetration testing
[Read more…]

Penetration Testing A Survival Guide (Packt Publishing)

Penetration Testing: A Survival Guide (Packt Publishing)
English | Size: 243.18 MB
Category: HACKING | Security


Microsoft Windows is one of the two most common OS and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS. This lets you focus on using the network penetration, password cracking, forensics tools and not the OS.
[Read more…]

Pluralsight – Infrastructure Testing with Pester

Pluralsight – Infrastructure Testing with Pester
English | Size:551.27 MB
Category: Tutorial


Not testing your infrastructure can be catastrophic. Learn how to prevent disaster and properly test your PowerShell and infrastructure with Pester.
Writing a small script, waiting to see if it errors out and then eyeballing the results are common. But are you sure that script you created actually did everything you intended? It’s important to understand just because a script doesn’t output an error and your manual eyeballing sees no problems doesn’t actually mean there isn’t one.
[Read more…]

Treehouse – Testing in Android

Treehouse – Testing in Android
English | Size: 231.27 MB
Category: Comp|Software Training


Properly testing your codebase is important, but that doesn’t mean it’s easy! In this stage, we’ll see why unit testing is so difficult on Android. We’ll also see how we can successfully implement unit tests using Mockito!
[Read more…]

Pluralsight – Introduction to Penetration Testing Using Metasploit by Keith Watson

Pluralsight – Introduction to Penetration Testing Using Metasploit by Keith Watson
English | Size: 512.58 MB
Category: Tutorial


Metasploit is one of the most widely used tools for penetration testing, providing powerful attack simulations, security assessment management, and more. In this course, Introduction to Penetration Testing Using metasploit, you’ll learn to use metasploit to enumerate available services, identify potential weaknesses, test vulnerabilities through exploitation, and gather evidence for reporting. [Read more…]

Lynda – Ethical Hacking – Website and Web Application Testing

Lynda – Ethical Hacking – Website and Web Application Testing
English | Size: 286.19 MB
Category: Tutorial


Websites and web applications are-by their very nature-accessible remotely, which puts them at high risk of cyber attack. Knowing how to prevent and detect web attacks is a critical skill for developers and information security professionals alike. Find out how to test your sites and applications for weaknesses in this course with cybersecurity expert Malcolm Shore. Malcolm examines the various parts of a web application [Read more…]

InfiniteSkills – Debugging and Testing Android Applications

InfiniteSkills – Debugging and Testing Android Applications
English | Size: 500.10 MB
Category: CBTs


In this Debugging and Testing Android Applications training course, expert author Chris Stanley will teach you how to effectively diagnose, isolate, and fix problems in Android applications. This course is designed for the absolute beginner, meaning no previous experience with debugging Android applications is required.
[Read more…]