877.791.9571 |

IT Security

Introduction to Enterprise Security: A Practitioner’s Guide

279-Page eBook

This book is not for the casual reader.  It is intended to dive deep into security and provide a foundation for building a security program and supporting controls framework.  It assumes a basic knowledge of networking and systems.  Security managers, security analysts, security engineers, security consultants, and IS auditors […]

By |November 5th, 2014||Comments Off

iOS Application Pen-Testing for Beginners

For more tips, tricks and guided training on penetration testing, consider joining us in our boot camp training course. See when we will be in a location near you here!

By |July 8th, 2014||Comments Off

Introduction to IT Security & Computer Forensics

Download the lab files for free right here >>

By |April 23rd, 2014||0 Comments

Information Hiding Alternatives – Part 10

By |January 27th, 2014||0 Comments

Certificate Related Issues – Part 9

Download our full CISSP Guide for free here >>

Information Hiding Alternatives >>

Modules in this short course:

Application & Use of Cryptography
Cryptographic Life Cycle and Encryption Concepts
Key Management Processes
Digital Signatures and Non-Repudiation
Methods of Cryptoanalytics Attacks
Using Cryptography to Maintain Network Security
Using Cryptography to Maintain Application Security
Public Key Infrastructure
Certificate Related Issues
Information Hiding Alternatives

By |January 27th, 2014||0 Comments

Cryptography & Public Key Infrastructure – Part 8

By |January 27th, 2014||0 Comments

Using Cryptography to Maintain Application Security – Part 7

Download our full CISSP Guide for free here >>

Cryptography & Public Key Infrastructure >>

Modules in this short course:

Application & Use of Cryptography
Cryptographic Life Cycle and Encryption Concepts
Key Management Processes
Digital Signatures and Non-Repudiation
Methods of Cryptoanalytics Attacks
Using Cryptography to […]

By |January 27th, 2014||0 Comments

Using Cryptography to Maintain Network Security – Part 6

Download our full CISSP Guide for free here >>

Using Cryptography to Maintain Network Security >>

Modules in this short course:

Application & Use of Cryptography
Cryptographic Life Cycle and Encryption Concepts
Key Management Processes
Digital Signatures and Non-Repudiation
Methods of Cryptoanalytics Attacks
Using Cryptography […]

By |January 27th, 2014||0 Comments

Methods of Cryptoanalytics Attacks – Part 5

Download our full CISSP Guide for free here >>

Using Cryptography to Maintain Network Security >>

Modules in this short course:

Application & Use of Cryptography
Cryptographic Life Cycle and Encryption Concepts
Key Management Processes
Digital Signatures and Non-Repudiation
Methods of Cryptoanalytics Attacks
Using Cryptography […]

By |January 27th, 2014||0 Comments

Digital Signatures and Non-Repudiation – Part 4

Download our full CISSP Guide for free here >>

Methods of Cryptoanalytics Attacks >>

Modules in this short course:

Application & Use of Cryptography
Cryptographic Life Cycle and Encryption Concepts
Key Management Processes
Digital Signatures and Non-Repudiation
Methods of Cryptoanalytics Attacks
Using Cryptography to Maintain […]

By |January 27th, 2014||0 Comments

Cryptography & Key Management Processes – Part 3

Download our full CISSP Guide for free here >>

Digital Signatures and Non-Repudiation >>

Modules in this short course:

Application & Use of Cryptography
Cryptographic Life Cycle and Encryption Concepts
Key Management Processes
Digital Signatures and Non-Repudiation
Methods of Cryptoanalytics Attacks
Using Cryptography to Maintain […]

By |January 27th, 2014||0 Comments

Cryptographic Life Cycle and Encryption Concepts – Part 2

Download our full CISSP Guide for free here >>

Next Module: Key Management Processes >>

Modules in this short course:

Application & Use of Cryptography
Cryptographic Life Cycle and Encryption Concepts
Key Management Processes
Digital Signatures and Non-Repudiation
Methods of Cryptoanalytics Attacks
Using Cryptography to […]

By |January 27th, 2014||0 Comments

Application & Use of Cryptography – part 1

Download our full CISSP Guide for free here >>

Next Module: Cryptographic Life Cycle and Encryption Concepts >>

Modules in this short course:

Application & Use of Cryptography
Cryptographic Life Cycle and Encryption Concepts
Key Management Processes
Digital Signatures and Non-Repudiation
Methods of Cryptoanalytics Attacks
[…]

By |January 26th, 2014||0 Comments

Cryptography Short Course (CISSP Domain #5)

Download our full CISSP Guide for free right here >>

Modules in this short course:

Application & Use of Cryptography
Cryptographic Life Cycle and Encryption Concepts
Key Management Processes
Digital Signatures and Non-Repudiation
Methods of Cryptoanalytics Attacks
Using Cryptography to Maintain Network Security
Using Cryptographc to Maintain Application Security
Public Key Infrastructure
Certificate Related Issues
Information Hiding Alternatives

By |January 24th, 2014||0 Comments

Pass the Security+ Performance-Based Questions

By |December 18th, 2013||0 Comments

Backtrack 5 R3 Walkthrough Guide

47 Page Ebook

Backtrack is one of the most popular Linux distributions used for Penetration testing and Security Auditing. The Backtrack development team is sponsored by Offensive Security. On 13th August 2012, Backtrack 5 R3 was released. This included the addition of about 60 new tools, most of which were […]

By |October 19th, 2013||Comments Off

The Beginner’s Guide to the Internet Underground

This Internet Underground short ebook covers the basics of anonymity, hactivism, & hidden parts of the Internet underground, along with some of the things you may find there. Many are still unaware what is available through the Tor network; from assassination hit lists to illegal drug dealing to weapons […]

By |October 6th, 2013||Comments Off

Introduction to IT Security and Computer Forensics

By |October 6th, 2013||0 Comments

Module 2: Darknet – Tor Hidden Services

 

By |October 6th, 2013||Comments Off