We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Penetration Tester

Search

Clear Expand Collapse

Becoming a Linux Power User

Becoming a Linux Power User is a technical skills course designed to elevate viewers to "Power User" status.

Course duration Duration: 8 hours, 45 min.

CompTIA PenTest + (PT0-002)

PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks.

Course duration Duration: 17 hours, 49 min.

EC-Council CEH V.12

The Certified Ethical Hacker(CEH) v12 course is designed to give the student a foundational knowledge base and skillset to be an asset to their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing and vulnerability assessments.

Course duration Duration: 48 hours, 17 min.

Hands-on Hacking

To become a well-rounded Ethical Hacker and/or Penetration Tester, not only must you be familiar with the appropriate tools and techniques, but you must also craft your methodology for applying said skills.

Course duration Duration: 14 hours, 20 min.

Hands-On Web App Pentesting

This course is designed for those looking to gain skills related to penetration testing web applications.

Course duration Duration: 9 hours, 55 min

How I Hacked Your Bank Account

Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.

Price
Course duration Duration: 25 minutes

ICS SCADA and IIoT Vulnerabilities

ICS SCADA and IIoT Vulnerabilities discusses the components of ICS, SCADA, and IIoT systems their vulnerabilities and threats.

Course duration Duration: 30 minutes

Intro to AV/EDR Evasion

Embark on your journey into the dynamic world of cybersecurity with our introductory course tailored for aspiring red team members or advanced penetration testers. Designed for those new to the realm of Antivirus (AV) and Endpoint Detection and Response (EDR) evasions.

Course duration Duration: 5 hours

Intro to IoT Pentesting

The proliferation of IoT devices, both at home and in the office, has significantly expanded the attack vectors for bad actors trying to gain a foothold on your network. Learn to pentest them today!

Course duration Duration: 9 hours, 40 min.

Linux Command Line

The Linux Command Line show is designed to introduce viewers to working on Linux based computers using only the command line interface. This is considered the first step in learning BASH scripting as most scripts are made up of a series of CLI commands.

Course duration Duration: 9 hours, 15 min.

Linux Fundamentals for Certification

The Linux Fundamentals for Certification learning path provides essential Linux operating system skills and prepares you for entry-level Linux certification exams. You'll master core command-line operations and fundamental system administration concepts.

Price
Course duration Duration: 74 hours, 15 min.

Linux in the Cloud

The Linux in the Cloud series focuses on implementing the Linux operating system in a virtualized environment.

Course duration Duration: 5 hours, 20 min.

Linux Security Techniques

The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.

Course duration Duration: 11 hours

Linux Shell Scripting - Advanced

In this series, Daniel and Justin take a look at some of the more advanced scripting practices. Here they will empower your scripts by taking advantage of things like Functions, Libraries, creating graphical elements, sed (Stream EDitor), gawk, and Regular Expression.

Course duration Duration: 8 hours, 15 min.

Linux Shell Scripting - Basics

In this series, Daniel and Don walk you through the fundamentals of bash scripting in the Linux operating system. Watch here as they take you through the fundamentals like: Script file formats, running scripts, working with variables, performing arithmetic, conditional statements, loops, presenting data, taking user input, and script control.

Course duration Duration: 8 hours, 45 minutes

MITM on PSTN

Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.

Price
Course duration Duration: 30 minutes

NIST Cybersecurity and Risk Management Frameworks

In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.

Course duration Duration: 21 hours, 20 min.

OWASP Top 10

This course is designed to teach you about the 2021 version of the OWASP Top 10 Web Application Vulnerabilities. The OWASP Top 10 is a list of the most critical security risks to web applications, and it is widely used by organizations to improve their web application security.

Course duration Duration: 8 hours

PowerShell Skills

This course is for anyone wanting to learn how to write PowerShell scripts to automate tasks.

Course duration Duration: 7 hours, 30 min.

Practical Pentesting: featuring Brad Stine

In this series, Daniel and Brad will take a look at what a pentesting engagement looks like through the lens of Brad's experience as a pentester.

Course duration Duration: 7 hours, 19 min.

Security Misconfiguration with Tal Kollender

Tal Kollender highlights how human errors and default settings lead to 80% of ransomware attacks. Discover the risks of manual remediation and how automation can reduce misconfigurations, shrinking the attack surface and enhancing network protection.

Price
Course duration Duration: 27 minutes

The True Potential of Web Race Conditions

James Kettle of PortSwigger reveals sophisticated web race condition exploits, demonstrating how attackers can manipulate state machines and create backdoors through precise timing attacks.

Price
Course duration Duration: 45 minutes

Vulnerable MinIO

Dive into the world of MinIO security as we uncover and exploit an information disclosure vulnerability, gaining access to sensitive data.

Course duration Duration: 1 hour, 30 Min.

Vulnerable TeamCity

This lab provides hands-on experience exploiting CVE-2023-42793, a critical vulnerability in JetBrains TeamCity. Learn to gain unauthorized access, escalate privileges, and execute arbitrary code on a vulnerable server.

Course duration Duration: 1 hour, 30 min.

Windows Terminal Skills

This course will acquaint learners with the new Windows Terminal Application.

Course duration Duration: 2 hours, 50 min.

Working with SSH

The Working with SSH show aims to remove the intimidation of using the Secure Shell protocol on your network. SSH allows for encrypting network communications to protect from eavesdropping and man-in-the-middle attacks. This series demonstrates how to configure and use SSH to securely manage your systems.

Course duration Duration: 40 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement