We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Penetration Testing

Search

Clear Expand Collapse

Breaking RSA Authentication & Bitstream Recovery

Arpan Jati reveals critical vulnerabilities in Xilinx's Zynq-7000 SoC platform, demonstrating RSA authentication bypass and encrypted bitstream recovery techniques that impact critical infrastructure security.

Price
Course duration Duration: 40 minutes

CompTIA PenTest + (PT0-002)

PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks.

Course duration Duration: 17 hours, 49 min.

Hands-on Hacking

To become a well-rounded Ethical Hacker and/or Penetration Tester, not only must you be familiar with the appropriate tools and techniques, but you must also craft your methodology for applying said skills.

Course duration Duration: 14 hours, 20 min.

Hands-On Web App Pentesting

This course is designed for those looking to gain skills related to penetration testing web applications.

Course duration Duration: 9 hours, 55 min

How I Hacked Your Bank Account

Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.

Price
Course duration Duration: 25 minutes

Intro to AV/EDR Evasion

Embark on your journey into the dynamic world of cybersecurity with our introductory course tailored for aspiring red team members or advanced penetration testers. Designed for those new to the realm of Antivirus (AV) and Endpoint Detection and Response (EDR) evasions.

Course duration Duration: 5 hours

Intro to IoT Pentesting

The proliferation of IoT devices, both at home and in the office, has significantly expanded the attack vectors for bad actors trying to gain a foothold on your network. Learn to pentest them today!

Course duration Duration: 9 hours, 40 min.

Jr Penetration Test - Theoretical

Join CyberSage for your hacker initiation and kick off your Penetration Testing journey today!

Course duration Duration: 2 hours

Linux Essentials

The Linux Essentials certification from the Linux Professional Institute is designed to showcase your foundation skills in working with the Linux operating system.

Course duration Duration: 8 hours, 40 min.

Linux Fundamentals for Certification

The Linux Fundamentals for Certification learning path provides essential Linux operating system skills and prepares you for entry-level Linux certification exams. You'll master core command-line operations and fundamental system administration concepts.

Price
Course duration Duration: 74 hours, 15 min.

Linux in the Cloud

The Linux in the Cloud series focuses on implementing the Linux operating system in a virtualized environment.

Course duration Duration: 5 hours, 20 min.

Linux Security Techniques

The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.

Course duration Duration: 11 hours

MITM on PSTN

Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.

Price
Course duration Duration: 30 minutes

OWASP Top 10

This course is designed to teach you about the 2021 version of the OWASP Top 10 Web Application Vulnerabilities. The OWASP Top 10 is a list of the most critical security risks to web applications, and it is widely used by organizations to improve their web application security.

Course duration Duration: 8 hours

Pentesting: Lessons in Tactical Intrusions

Christophe Seigneur of Toray Carbon Fibers Europe shares insights from implementing a pragmatic pentesting program at Toray Industries, covering strategic communication, quick wins and SOC/EDR effectiveness evaluation.

Course duration Duration: 35 minutes

Practical Pentesting: featuring Brad Stine

In this series, Daniel and Brad will take a look at what a pentesting engagement looks like through the lens of Brad's experience as a pentester.

Course duration Duration: 7 hours, 19 min.

The True Potential of Web Race Conditions

James Kettle of PortSwigger reveals sophisticated web race condition exploits, demonstrating how attackers can manipulate state machines and create backdoors through precise timing attacks.

Price
Course duration Duration: 45 minutes

Vulnerable MinIO

Dive into the world of MinIO security as we uncover and exploit an information disclosure vulnerability, gaining access to sensitive data.

Course duration Duration: 1 hour, 30 Min.

Vulnerable TeamCity

This lab provides hands-on experience exploiting CVE-2023-42793, a critical vulnerability in JetBrains TeamCity. Learn to gain unauthorized access, escalate privileges, and execute arbitrary code on a vulnerable server.

Course duration Duration: 1 hour, 30 min.

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement