|  

Pluralsight | Paths | Security for Hackers and Developers [FCO] GloDLS



Size :1.84 GB
Peers : Seeders : 0      Leechers : 0
Added : 5 years ago » by SaM » in Tutorials
Language : English
Last Updated :7 months ago
Info_Hash :28118567495C3CABB54B93383A3C7B56626C98DD

Torrent File Contents

Pluralsight | Paths | Security for Hackers and Developers [FCO] GloDLS
  01_Beginner/01_Security for Hackers and Developers - Overview/00. Course Overview/00. Course Overview.mp4
  -  8.96 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/00. Course Overview/00. Course Overview.srt
  -  2.64 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/00. Introduction.mp4
  -  3.7 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/00. Introduction.srt
  -  5.68 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/01. Why Bugs Happen.mp4
  -  4.97 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/01. Why Bugs Happen.srt
  -  9.08 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/02. Ongoing Considerations.mp4
  -  7.98 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/02. Ongoing Considerations.srt
  -  13.67 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/03. Summary.mp4
  -  286.8 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/03. Summary.srt
  -  411 Bytes

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/00. Introduction.mp4
  -  610.33 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/00. Introduction.srt
  -  832 Bytes

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/01. Raising Security IQ.mp4
  -  5.54 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/01. Raising Security IQ.srt
  -  8.63 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/02. SDL.mp4
  -  7.52 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/02. SDL.srt
  -  5.89 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/03. Push to the Left.mp4
  -  426.78 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/03. Push to the Left.srt
  -  497 Bytes

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/04. Attack Surface Reduction.mp4
  -  2.96 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/04. Attack Surface Reduction.srt
  -  3.52 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/05. Threat Modeling.mp4
  -  5.6 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/05. Threat Modeling.srt
  -  5.76 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/06. Threat Model Demo.mp4
  -  12.11 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/06. Threat Model Demo.srt
  -  4.49 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/07. Wrap-up.mp4
  -  1.57 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/07. Wrap-up.srt
  -  2.21 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/00. Why Do Bugs Manifest - .mp4
  -  5.61 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/00. Why Do Bugs Manifest - .srt
  -  8.68 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/01. Where Do Bugs Hide - .mp4
  -  6.39 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/01. Where Do Bugs Hide - .srt
  -  7.33 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/02. How to Find Bugs - .mp4
  -  2.7 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/02. How to Find Bugs - .srt
  -  3.3 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/00. Introduce Automated Code Analysis.mp4
  -  4.07 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/00. Introduce Automated Code Analysis.srt
  -  7.2 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/01. Applying the Static Analysis Review Cycle.mp4
  -  5.37 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/01. Applying the Static Analysis Review Cycle.srt
  -  5.49 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/02. Understanding Basic Tool.mp4
  -  9.41 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/02. Understanding Basic Tool.srt
  -  7.3 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/00. Manual Analysis Process.mp4
  -  3.53 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/00. Manual Analysis Process.srt
  -  5.13 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/01. Techniques.mp4
  -  3.34 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/01. Techniques.srt
  -  7.38 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/02. Assess Threats.mp4
  -  4.54 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/02. Assess Threats.srt
  -  6.29 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/03. Case Study.mp4
  -  12.67 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/03. Case Study.srt
  -  7.95 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/04. Summarize Techniques and Course.mp4
  -  5.97 MB

  01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/04. Summarize Techniques and Course.srt
  -  4.96 KB

  01_Beginner/01_Security for Hackers and Developers - Overview/Exercise Files/Exercise Files security-hackers-developers.zip
  -  1.68 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/00. Course Overview/00. Course Overview.mp4
  -  9.94 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/00. Course Overview/00. Course Overview.srt
  -  2.38 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/00. Introduction to Malware.mp4
  -  1.94 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/00. Introduction to Malware.srt
  -  3.1 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/01. Demo - Analyzing a Bromium Alert.mp4
  -  27.29 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/01. Demo - Analyzing a Bromium Alert.srt
  -  16.6 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/02. Security Tool Follow-up.mp4
  -  7.58 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/02. Security Tool Follow-up.srt
  -  11.6 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/03. First Malware Analysis Lab.mp4
  -  698.52 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/03. First Malware Analysis Lab.srt
  -  1.32 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/00. Recognizing Exploit Vector Intro.mp4
  -  6.59 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/00. Recognizing Exploit Vector Intro.srt
  -  7.05 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/01. How to Find the Exploit in a Malware Attack.mp4
  -  20.98 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/01. How to Find the Exploit in a Malware Attack.srt
  -  17.63 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/02. Exploit Finding Demo.mp4
  -  18.41 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/02. Exploit Finding Demo.srt
  -  4.92 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/03. Exploit Finding Lab 1.mp4
  -  303.47 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/03. Exploit Finding Lab 1.srt
  -  510 Bytes

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/00. Intro and Why to Script.mp4
  -  10.18 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/00. Intro and Why to Script.srt
  -  8.55 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/01. Continued Deobfuscation.mp4
  -  18.74 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/01. Continued Deobfuscation.srt
  -  12.51 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/02. Deobfuscation Demo.mp4
  -  14.25 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/02. Deobfuscation Demo.srt
  -  4.76 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/03. Deobfuscation Lab 1.mp4
  -  658.54 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/03. Deobfuscation Lab 1.srt
  -  954 Bytes

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/00. Module Overview and Homework Review.mp4
  -  3.86 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/00. Module Overview and Homework Review.srt
  -  3.47 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/01. Exploit Kit Details.mp4
  -  5.71 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/01. Exploit Kit Details.srt
  -  8.77 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/02. Deobfuscation 2.mp4
  -  7.73 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/02. Deobfuscation 2.srt
  -  7.58 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/03. Deobfuscation Lab 2.mp4
  -  644.22 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/03. Deobfuscation Lab 2.srt
  -  1.09 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/00. Module Goals and Assignment Review.mp4
  -  3.89 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/00. Module Goals and Assignment Review.srt
  -  2.31 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/01. DGAs and More.mp4
  -  8.41 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/01. DGAs and More.srt
  -  5.99 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/02. Non-DGA EKs.mp4
  -  3.7 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/02. Non-DGA EKs.srt
  -  3.39 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/03. Begining EK Detection Lab.mp4
  -  1.78 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/03. Begining EK Detection Lab.srt
  -  3.45 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/00. How to Find More Samples.mp4
  -  2.25 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/00. How to Find More Samples.srt
  -  3.17 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/01. Malware Detection.mp4
  -  3.73 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/01. Malware Detection.srt
  -  3.91 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/02. YARA.mp4
  -  4.48 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/02. YARA.srt
  -  4.76 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/03. YARA Examples and Lab.mp4
  -  6.41 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/03. YARA Examples and Lab.srt
  -  5.74 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/00. Malware Analysis Goals.mp4
  -  4.35 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/00. Malware Analysis Goals.srt
  -  7.93 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/01. Another Sample.mp4
  -  6.26 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/01. Another Sample.srt
  -  6.18 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/02. Dynamic Analysis Walk-through.mp4
  -  10.64 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/02. Dynamic Analysis Walk-through.srt
  -  10.78 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/03. Sandbox Assignment.mp4
  -  1.26 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/03. Sandbox Assignment.srt
  -  2.64 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/00. File Analysis Tools and Techniques.mp4
  -  8.53 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/00. File Analysis Tools and Techniques.srt
  -  7.24 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/01. Demo - How to Use the tools.mp4
  -  19.4 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/01. Demo - How to Use the tools.srt
  -  8.13 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/02. More Tool Details.mp4
  -  8.19 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/02. More Tool Details.srt
  -  7.21 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/03. Assignment - Run and Report.mp4
  -  1.65 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/03. Assignment - Run and Report.srt
  -  2.12 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/00. Static or Dynamic Analysis - .mp4
  -  986.86 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/00. Static or Dynamic Analysis - .srt
  -  1.78 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/01. Demo - Extract Malware with IDA Debugger.mp4
  -  33.54 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/01. Demo - Extract Malware with IDA Debugger.srt
  -  8.3 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/02. More on how to Choose an Approach.mp4
  -  14.67 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/02. More on how to Choose an Approach.srt
  -  10.3 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/03. Debug Details and Assignment.mp4
  -  17.92 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/03. Debug Details and Assignment.srt
  -  13.64 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/00. Demo and Lesson Plan.mp4
  -  964.6 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/00. Demo and Lesson Plan.srt
  -  1.85 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/01. Reversing Demo.mp4
  -  33.9 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/01. Reversing Demo.srt
  -  13.34 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/02. Goals and Cyclic Recap.mp4
  -  10.45 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/02. Goals and Cyclic Recap.srt
  -  7.04 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/03. Reversing Details and Assignment.mp4
  -  10.03 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/03. Reversing Details and Assignment.srt
  -  9.15 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/00. Intro and Recap.mp4
  -  7.3 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/00. Intro and Recap.srt
  -  2.45 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/01. How to Report Treat Data.mp4
  -  12.99 MB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/01. How to Report Treat Data.srt
  -  12.52 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/02. Summary and Assignment.mp4
  -  987.81 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/02. Summary and Assignment.srt
  -  1.02 KB

  03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/Exercise Files/Exercise Files malware-advanced-analysis-combating-exploit-kits.zip
  -  25.3 MB

  02_Intermediate/02_Security for Hackers and Developers - Code Auditing.zip
  -  283.12 MB

  02_Intermediate/03_Security for Hackers and Developers - Fuzzing.zip
  -  312.09 MB

  02_Intermediate/04_Security for Hackers and Developers - Reverse Engineering.zip
  -  309.35 MB

  02_Intermediate/05_Security for Hackers and Developers - Exploit Development.zip
  -  429.37 MB

  0. Websites you may like/1. (FreeTutorials.Us) Download Udemy Paid Courses For Free.url
  -  328 Bytes

  0. Websites you may like/2. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url
  -  286 Bytes

  0. Websites you may like/3. (NulledPremium.com) Download Cracked Website Themes, Plugins, Scripts And Stock Images.url
  -  163 Bytes

  0. Websites you may like/4. (FTUApps.com) Download Cracked Developers Applications For Free.url
  -  239 Bytes

  0. Websites you may like/5. (Discuss.FTUForum.com) FTU Discussion Forum.url
  -  294 Bytes

  0. Websites you may like/How you can help Team-FTU.txt
  -  237 Bytes



Torrent Description

Description:


Author: Dr. Jared DeMott
Language: English
Subtitle: Included
Torrent Contains: 302 Files, 62 Folders
Course Source: https://www.pluralsight.com/paths/security-for-hackers-and-developers

Description

Security for Hackers and Developers lays the foundation for anyone interested in creating secure software and systems, or anyone interested in hacking computer systems. Upon completion of this path, you will have learned how to discover, analyze, fix, as well as exploit vulnerabilities. Join Dr. DeMott on this cyber security learning journey, and help make your projects and networks safer.

What you will learn

• The fundamentals of software security and a security-oriented development process
• How and when to audit source code
• How to use various fuzzing techniques
• How to reverse compiled software using IDA Pro
• How to detect and exploit bugs in software, including stack overflows, function pointer overwrites, off-by-ones, integer errors, uninitialized variable attacks, heap spraying, and ROP
• How to detect and analyze exploit kits (EKs)
• How to pull apart the malware payloads dropped by the initial exploit or EK

Pre-requisites

There are no required prerequisites for this path. Programming (specifically with C/C++/.asm) and information/cyber security knowledge and experience is helpful, but not necessary.

Courses Content Table

Beginner - The Security for Hackers and Developers: Overview course will teach you the fundamentals of software security and a security-oriented development process, and in doing so, provide the foundation for you to move to the intermediate courses which focus on code auditing, fuzzing, reverse engineering, and exploit development.

01. Security for Hackers and Developers: Overview

Intermediate - There are four technical skills required by security researchers, quality engineers, and developers concerned with software security: source code auditing, fuzzing, reverse engineering, and exploitation. With the understanding these four courses provide, you’ll be ready to move on to the advanced course in this path Advanced Malware Analysis: Combating Exploit Kits.

02. Security for Hackers and Developers: Code Auditing
03. Security for Hackers and Developers: Fuzzing
04. Security for Hackers and Developers: Reverse Engineering
05. Security for Hackers and Developers: Exploit Development

Advanced - In the final course in this path, you'll draw on the knowledge and skills you’ve learned in order to analyze and detect an advanced form of malware, exploit kits.

06. Advanced Malware Analysis: Combating Exploit Kits.