Pluralsight – Infrastructure Testing with Pester

Pluralsight – Infrastructure Testing with Pester
English | Size:551.27 MB
Category: Tutorial


Not testing your infrastructure can be catastrophic. Learn how to prevent disaster and properly test your PowerShell and infrastructure with Pester.
Writing a small script, waiting to see if it errors out and then eyeballing the results are common. But are you sure that script you created actually did everything you intended? It’s important to understand just because a script doesn’t output an error and your manual eyeballing sees no problems doesn’t actually mean there isn’t one.
[Read more…]

Treehouse – Testing in Android

Treehouse – Testing in Android
English | Size: 231.27 MB
Category: Comp|Software Training


Properly testing your codebase is important, but that doesn’t mean it’s easy! In this stage, we’ll see why unit testing is so difficult on Android. We’ll also see how we can successfully implement unit tests using Mockito!
[Read more…]

Pluralsight – Introduction to Penetration Testing Using Metasploit by Keith Watson

Pluralsight – Introduction to Penetration Testing Using Metasploit by Keith Watson
English | Size: 512.58 MB
Category: Tutorial


Metasploit is one of the most widely used tools for penetration testing, providing powerful attack simulations, security assessment management, and more. In this course, Introduction to Penetration Testing Using metasploit, you’ll learn to use metasploit to enumerate available services, identify potential weaknesses, test vulnerabilities through exploitation, and gather evidence for reporting. [Read more…]

Lynda – Ethical Hacking – Website and Web Application Testing

Lynda – Ethical Hacking – Website and Web Application Testing
English | Size: 286.19 MB
Category: Tutorial


Websites and web applications are-by their very nature-accessible remotely, which puts them at high risk of cyber attack. Knowing how to prevent and detect web attacks is a critical skill for developers and information security professionals alike. Find out how to test your sites and applications for weaknesses in this course with cybersecurity expert Malcolm Shore. Malcolm examines the various parts of a web application [Read more…]

InfiniteSkills – Debugging and Testing Android Applications

InfiniteSkills – Debugging and Testing Android Applications
English | Size: 500.10 MB
Category: CBTs


In this Debugging and Testing Android Applications training course, expert author Chris Stanley will teach you how to effectively diagnose, isolate, and fix problems in Android applications. This course is designed for the absolute beginner, meaning no previous experience with debugging Android applications is required.
[Read more…]

SANS SEC542 Web App Penetration Testing and Ethical Hacking 2016

SANS SEC542 Web App Penetration Testing and Ethical Hacking 2016
English | Size: 485.56 MB
Category: Security


SEC542.1: Web Penetration Testing and Ethical Hacking: Introduction and Information Gathering
SEC542.2: Web Penetration Testing and Ethical Hacking: Configuration, Identity, and Authentication Testing…. [Read more…]

stackskills – Learn HackingPenetration Testing Using Android From Scratch

stackskills – Learn Hacking/Penetration Testing Using Android From Scratch
English | Size:1.17 GB
Category:CBTs


using Android as a penetration testing tool, you will start as a beginner with no previous knowledge about penetration testing. The course will start with you from scratch, from preparing your Android device and computer, installing the needed apps and will finish up with examples of real life scenarios that will give you full control over various computer systems. [Read more…]

Packt Publishing – Python Web Penetration Testing

Packt Publishing – Python Web Penetration Testing
English | Size:783.87 MB
Category: Programming


Flask and Python combined can help you build and structure effective Web APIs. In this course, you will get an understanding of how REST works relative to APIs, and we’ll cover how to test APIs written in Python with the support of Flask. We will then progress by securing our web APIs with HTTPs. The use of Python allows testers to write system-specific scripts, or alter and extend existing testing tools to find, exploit, and record as many security weaknesses as possible just as professional hackers do. By the end of the course, you will learn various cyber attacks modify existing tools to suit your application’s needs. [Read more…]

Lynda.com Ethical Hacking Penetration Testing Tutorial

Ethical Hacking Penetration Testing Tutorial
English | Size:177.09 MB
Category:Tutorial


You’ve done everything you can to logically secure your systems, along with layering in user education and providing physical security. However, the only way to know if your defenses will hold is to test them. This course looks at one of the most important skills of any IT security professional: penetration testing. A key competency for the Certified Ethical Hacker exam, penetration testing is the process to check if a computer, system, network, or web application has any vulnerabilities. Cybersecurity expert Lisa Bock reviews the steps involved in performing a worthwhile penetration test, including auditing systems, listing and prioritizing vulnerabilities, and mapping out attack points a hacker might target. She also defines the various types of “pen” tests-such as black, grey, and white box; announced vs. unannounced; and automated vs. manual testing-and the techniques and blueprints a pen tester should use to test everything from Wi-Fi to VoIP. Finally, she discusses how to choose and work with an outsourced pen-testing organization, which can bring a valuable outsider’s perspective to your IT security efforts. [Read more…]

O’Reilly – Penetration Testing With the Metasploit Framework

Penetration Testing With the Metasploit Framework
English | Size: 0.98 GB
Category: Infinite Skills


Penetration Testing With the Metasploit Framework Training Video

An essential requirement for protecting any organization’s computer and network systems from adversarial attack is finding the vulnerabilities in those systems before the bad guys do. In this course, cybersecurity expert Ric Messier shows you how to use Metasploit, the open source, multi-platform (Linux, Windows, Mac OS) exploit framework deployed by systems administrators and security engineers everywhere to spot those vulnerabilities. [Read more…]