Pluralsight | Paths | Security for Hackers and Developers [FCO]

seeders: 13
leechers: 23
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 175
  • Language: English

Files

[FreeCoursesOnline.Me] [Pluralsight] Paths - Security for Hackers and Developers [FCO] 01_Beginner 01_Security for Hackers and Developers - Overview 00. Course Overview
  • 00. Course Overview.mp4 (9.0 MB)
  • 00. Course Overview.srt (2.6 KB)
01. Introduction
  • 00. Introduction.mp4 (3.7 MB)
  • 00. Introduction.srt (5.7 KB)
  • 01. Why Bugs Happen.mp4 (5.0 MB)
  • 01. Why Bugs Happen.srt (9.1 KB)
  • 02. Ongoing Considerations.mp4 (8.0 MB)
  • 02. Ongoing Considerations.srt (13.7 KB)
  • 03. Summary.mp4 (286.8 KB)
  • 03. Summary.srt (0.4 KB)
02. Understanding the Security Development Lifecycle - SDL
  • 00. Introduction.mp4 (610.3 KB)
  • 00. Introduction.srt (0.8 KB)
  • 01. Raising Security IQ.mp4 (5.5 MB)
  • 01. Raising Security IQ.srt (8.6 KB)
  • 02. SDL.mp4 (7.5 MB)
  • 02. SDL.srt (5.9 KB)
  • 03. Push to the Left.mp4 (426.8 KB)
  • 03. Push to the Left.srt (0.5 KB)
  • 04. Attack Surface Reduction.mp4 (3.0 MB)
  • 04. Attack Surface Reduction.srt (3.5 KB)
  • 05. Threat Modeling.mp4 (5.6 MB)
  • 05. Threat Modeling.srt (5.8 KB)
  • 06. Threat Model Demo.mp4 (12.1 MB)
  • 06. Threat Model Demo.srt (4.5 KB)
  • 07. Wrap-up.mp4 (1.6 MB)
  • 07. Wrap-up.srt (2.2 KB)
03. Uncovering Security Bugs
  • 00. Why Do Bugs Manifest - .mp4 (5.6 MB)
  • 00. Why Do Bugs Manifest - .srt (8.7 KB)
  • 01. Where Do Bugs Hide - .mp4 (6.4 MB)
  • 01. Where Do Bugs Hide - .srt (7.3 KB)
  • 02. How to Find Bugs - .mp4 (2.7 MB)
  • 02. How to Find Bugs - .srt (3.3 KB)
04. Using Static Analysis
  • 00. Introduce Automated Code Analysis.mp4 (4.1 MB)
  • 00. Introduce Automated Code Analysis.srt (7.2 KB)
  • 01. Applying the Static Analysis Review Cycle.mp4 (5.4 MB)
  • 01. Applying the Static Analysis Review Cycle.srt (5.5 KB)
  • 02. Understanding Basic Tool.mp4 (9.4 MB)
  • 02. Understanding Basic Tool.srt (7.3 KB)
05. Pentesting Code - Learning from a Case Study
  • 00. Manual Analysis Process.mp4 (3.5 MB)
  • 00. Manual Analysis Process.srt (5.1 KB)
  • 01. Techniques.mp4 (3.3 MB)
  • 01. Techniques.srt (7.4 KB)
  • 02. Assess Threats.mp4 (4.5 MB)
  • 02. Assess Threats.srt (6.3 KB)
  • 03. Case Study.mp4 (12.7 MB)
  • 03. Case Study.srt (7.9 KB)
  • 04. Summarize Techniques and Course.mp4 (6.0 MB)
  • 04. Summarize Techniques and Course.srt (5.0 KB)
Exercise Files
  • Exercise Files security-hackers-developers.zip (1.7 MB)
03_Advanced 06_Advanced Malware Analysis - Combating Exploit Kits 00. Course Overview
  • 00. Course Overview.mp4 (9.9 MB)
  • 00. Course Overview.srt (2.4 KB)
01. Introduction
  • 00. Introduction to Malware.mp4 (1.9 MB)
  • 00. Introduction to Malware.srt (3.1 KB)
  • 01. Demo - Analyzing a Bromium Alert.mp4 (27.3 MB)
  • 01. Demo - Analyzing a Bromium Alert.srt (16.6 KB)
  • 02. Security Tool Follow-up.mp4 (7.6 MB)
  • 02. Security Tool Follow-up.srt (11.6 KB)
  • 03. First Malware Analysis Lab.mp4 (698.5 KB)
  • 03. First Malware Analysis Lab.srt (1.3 KB)
02. Recognizing the Exploit Vector
  • 00. Recognizing Exploit Vector Intro.mp4 (6.6 MB)
  • 00. Recognizing Exploit Vector Intro.srt (7.0 KB)
  • 01. How to Find the Exploit in a Malware Attack.mp4 (21.0 MB)
  • 01. How to Find the Exploit in a Malware Attack.srt (17.6 KB)
  • 02. Exploit Finding Demo.mp4 (18.4 MB)
  • 02. Exploit Finding Demo.srt (4.9 KB)
  • 03. Exploit Finding Lab 1.mp4 (303.5 KB)
  • 03. Exploit Finding Lab 1.srt (0.5 KB)
03. Unraveling Exploit Obfuscation
  • 00. Intro and Why to Script.mp4 (10.2 MB)
  • 00. Intro and Why to Script.srt (8.5 KB)
  • 01. Continued Deobfuscation.mp4 (18.7 MB)
  • 01. Continued Deobfuscation.srt (12.5 KB)
  • 02. Deobfuscation Demo.mp4 (14.3 MB)
  • 02. Deobfuscation Demo.srt (4.8 KB)
  • 03. Deobfuscation Lab 1.mp4 (658.5 KB)
  • 03. Deobfuscation Lab 1.srt (0.9 KB)
04. Circumventing Exploit Kit Encryption
  • 00. Module Overview and Homework Review.mp4 (3.9 MB)
  • 00. Module Overview and Homework Review.srt (3.5 KB)
  • 01. Exploit Kit Details.mp4 (5.7 MB)
  • 01. Exploit Kit Details.srt (8.8 KB)
  • 02. Deobfuscation 2.mp4 (7.7 MB)
  • 02. Deobfuscation 2.srt (7.6 KB)
  • 03. Deobfuscation Lab 2.mp4 (644.2 KB)
  • 03. Deobfuscation Lab 2.srt (1.1 KB)
05. Understanding Moving Target Communications
  • 00. Module Goals and Assignment Review.mp4 (3.9 MB)
  • 00. Module Goals and Assignment Review.srt (2.3 KB)
  • 01. DGAs and More.mp4 (8.4 MB)
  • 01. DGAs and More.srt (6.0 KB)
  • 02. Non-DGA EKs.mp4 (3.7 MB)
  • 02. Non-DGA EKs.srt (3.4 KB)
  • 03. Begining EK Detection Lab.mp4 (1.8 MB)
  • 03. Begining EK Detection Lab.srt (3.5 KB)
06. Detecting Angler in the Wild
  • 00. How to Find More Samples.mp4 (2.2 MB)
  • 00. How to Find More Samples.srt (3.2 KB)
  • 01. Malware Detection.mp4 (3.7 MB)
  • 01. Malware Detection.srt (3.9 KB)
  • 02. YARA.mp4 (4.5 MB)
  • 02. YARA.srt (4.8 KB)
  • 03. YARA Examples and Lab.mp4 (6.4 MB)
  • 03. YARA Examples and Lab.srt (5.7 KB)
07. Performing Safe Dynamic Analysis
  • 00. Malware Analysis Goals.mp4 (4.3 MB)
  • 00. Malw

Description



Author : Dr. Jared DeMott
Language : English
Subtitle : Included
Torrent Contains : 302 Files, 62 Folders
Course Source : https://www.pluralsight.com/paths/security-for-hackers-and-developers

Description

Security for Hackers and Developers lays the foundation for anyone interested in creating secure software and systems, or anyone interested in hacking computer systems. Upon completion of this path, you will have learned how to discover, analyze, fix, as well as exploit vulnerabilities. Join Dr. DeMott on this cyber security learning journey, and help make your projects and networks safer.

What you will learn

• The fundamentals of software security and a security-oriented development process
• How and when to audit source code
• How to use various fuzzing techniques
• How to reverse compiled software using IDA Pro
• How to detect and exploit bugs in software, including stack overflows, function pointer overwrites, off-by-ones, integer errors, uninitialized variable attacks, heap spraying, and ROP
• How to detect and analyze exploit kits (EKs)
• How to pull apart the malware payloads dropped by the initial exploit or EK

Pre-requisites

There are no required prerequisites for this path. Programming (specifically with C/C++/.asm) and information/cyber security knowledge and experience is helpful, but not necessary.

Courses Content Table

Beginner - The Security for Hackers and Developers: Overview course will teach you the fundamentals of software security and a security-oriented development process, and in doing so, provide the foundation for you to move to the intermediate courses which focus on code auditing, fuzzing, reverse engineering, and exploit development.

01. Security for Hackers and Developers: Overview

Intermediate - There are four technical skills required by security researchers, quality engineers, and developers concerned with software security: source code auditing, fuzzing, reverse engineering, and exploitation. With the understanding these four courses provide, you’ll be ready to move on to the advanced course in this path Advanced Malware Analysis: Combating Exploit Kits.

02. Security for Hackers and Developers: Code Auditing
03. Security for Hackers and Developers: Fuzzing
04. Security for Hackers and Developers: Reverse Engineering
05. Security for Hackers and Developers: Exploit Development

Advanced - In the final course in this path, you'll draw on the knowledge and skills you’ve learned in order to analyze and detect an advanced form of malware, exploit kits.

06. Advanced Malware Analysis: Combating Exploit Kits.

For More Udemy Free Courses >>> https://ftuforum.com/
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.ftuforum.com/






Download torrent
1.8 GB
seeders:13
leechers:23
Pluralsight | Paths | Security for Hackers and Developers [FCO]


Trackers

tracker name
udp://tracker.iamhansen.xyz:2000/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.uw0.xyz:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://denis.stalker.upeer.me:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://tracker.tiny-vps.com:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
µTorrent compatible trackers list

Download torrent
1.8 GB
seeders:13
leechers:23
Pluralsight | Paths | Security for Hackers and Developers [FCO]


Torrent hash: 28118567495C3CABB54B93383A3C7B56626C98DD