Metasploit

Next-Level Metasploit

Coming Soon     Fill out this form to sign up for the class.

Windows For InfoSec Professionals

Coming Soon     Fill out this form to sign up for the class.
network pentesting

Network Pentesting Night School

network pentesting Linux For InfoSec Professionals & Comptia Linux+ Exam Prep The primary focus of the class is getting the student comfortable with tools and tactics used in modern network pentesting. Class Outline Day 1...
pentester

Web App Pentesting Night School

The primary focus of the class is transitioning from Network to Web App Pentesting Differences and similarities Learning the popular technologies and platforms in use today Manually Identifying & Exploiting Vulnerabilities SQL...
linux

Linux For InfoSec Professionals & Comptia Linux+ Exam Prep

There really aren't very many things that are more critical to your becoming a competent InfoSec professional than Linux. Just like a good plumber needs his tools so does the budding InfoSec...
network pentesting

Pentester Candidate Program – July 2017

Pentester Candidate Program July 2017 The pentester program will start on this weekend. I have received so many requests to extend the pricing. So, here is an offer for today and tomorrow....
Infosec Addicts

CYBERWAR: Advanced Offensive Cyber Operations

cyber Security Offensive Security CYBERWAR: Advanced Offensive Cyber Operations - Night Classes I'm writing this post to let you know that the new night class version of CyberWar: Advanced Offensive Cyber Operations course which...
PCI

PCI and MFA – what it means to you

PCI Offensive Security Network Security Offensive Security PCI Offensive Security Network Security Offensive Security Powershell Pythone Infosec Addicts PCI and MFA – what it means to you I just finished reading the PCI Guru blog post about Multi-Factor Authentication. This is found in...
Splunk

InfoSec Addicts Defensive Saturday Bundle: Splunk/ELK/Suricata/Bro-IDS

Defensive Security When it comes to log analysis Splunk and the ELK / Elastic Stack are the biggest enterprise grade solution approaches in the field. Splunk is a publicly traded company that...
BYPASSING RESTRICTED ENVIRONMENTS

BYPASSING RESTRICTED ENVIRONMENTS

Network Security Offensive Security I just got an email from an old student that is doing a pentest and he asked me about pentesting restricted environments like locked down desktops, Citrix, kiosks, etc....