Bug Hunters Diary

A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security Course Layout Chapter 1: Bug HuntingChapter 2: Back to the ’90sChapter 3: Escape from the WWW ZoneChapter 4: NULL Pointer FTWChapter 5: Browse and You’re OwnedChapter 6: One Kernel to Rule Them AllChapter 7: A Bug Older Read more…

The Web Application Hacker’s Handbook Finding And Exploiting Security Flaws

The Web Application Hacker’s Handbook Finding And Exploiting Security Flaws Course Layout 1: Web Application (In)security2: Core Defense Mechanisms3: Web Application Technologies4: Mapping the Application5: Bypassing Client-Side Controls6: Attacking Authentication7: Attacking Session Management8: Attacking Access Controls9: Attacking Data Stores10: Attacking Back-End Components11: Attacking Application Logic12: Attacking Users: Cross-Site Scripting13: Attacking Read more…

Penetration Testing A Hands-On Introduction to Hacking

Penetration Testing A Hands-On Introduction to Hacking Course Layout Part I: The Basics1: Setting Up Your Virtual Lab2: Using Kali Linux3: Programming4: Using the Metasploit FrameworkPart II: Assessments5: Information Gathering6: Finding Vulnerabilities7: Capturing TrafficPart III: Attacks8: Exploitation9: Password Attacks10: Client-Side Exploitation11: Social Engineering12: Bypassing Antivirus Applications13: Post Exploitation14: Web Application Read more…

Linux Basics for Hackers Getting Started with Networking, Scripting, and Security in Kali

Linux Basics for Hackers Getting Started with Networking, Scripting, and Security in Kali Course layout Chapter 1: GETTING STARTED WITH THE BASICSChapter 2: TEXT MANIPULATIONChapter 3: ANALYZING AND MANAGING NETWORKSChapter 4: ADDING AND REMOVING SOFTWAREChapter 5: CONTROLLING FILE AND DIRECTORY PERMISSIONSChapter 6: PROCESS MANAGEMENTChapter 7: MANAGING USER ENVIRONMENT VARIABLESChapter 8: Read more…

Computer Networking A Top-Down Approach, Global Edition – 8th Edition (Updated Content)

Computer Networking A Top-Down Approach, Global Edition – 8th Edition (Updated Content) Course layout Chapter 1: Computer Networks and the InternetChapter 2: Application LayerChapter 3: Transport LayerChapter 4: The Network Layer: Data PlaneChapter 5: The Network Layer: Control PlaneChapter 6: The Link Layer and LANsChapter 7: Wireless and Mobile NetworksChapter Read more…

Python Crash Course – 2nd Edition

Python Crash Course – 2nd Edition IntroductionPart I: BasicsChapter 1: Getting StartedChapter 2: Variables and Simple Data TypesChapter 3: Introducing ListsChapter 4: Working with ListsChapter 5: if StatementsChapter 6: DictionariesChapter 7: User Input and while LoopsChapter 8: FunctionsChapter 9: ClassesChapter 10: Files and ExceptionsChapter 11: Testing Your CodePart II: Projects Read more…

Python Crash Course – 1st Edition

Python Crash Course – 1st Edition IntroductionPart I: BasicsChapter 1: Getting StartedChapter 2: Variables and Simple Data TypesChapter 3: Introducing ListsChapter 4: Working with ListsChapter 5: if StatementsChapter 6: DictionariesChapter 7: User Input and while LoopsChapter 8: FunctionsChapter 9: ClassesChapter 10: Files and ExceptionsChapter 11: Testing Your CodePart II: Projects Read more…