Stuxnet to Sunburst 20 Years of Digital Exploitation and Cyber Warfare

Stuxnet to Sunburst 20 Years of Digital Exploitation and Cyber Warfare
English | eBook | Size: 6.28 MB


Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build the capability of digital eavesdropping and industrial espionage.

Offensive IOT Exploitation

Offensive IOT Exploitation
English | Tutorial | Size: 2.49 GB


COURSE ABSTRACT
IoT or the Internet of Things is one of the most upcoming trends in technology as of now. A lot many new devices are coming up every single month. However, not much attention has been paid to the device’s security till now.

BlackHillsInfoSec – Windows Post Exploitation BootCamp

BlackHillsInfoSec – Windows Post Exploitation BootCamp
English | Tutorial | Size: 3.72 GB


Kyle Avery started with Black Hills Information Security (BHIS) as an intern in October 2020 and was hired on as a full-time Penetration Tester in December 2020.

Pluralsight – Assessing Red Team Post Exploitation Activity

Pluralsight – Assessing Red Team Post Exploitation Activity
English | Tutorial | Size: 304.91 MB


In this course, you will explore the mindset and techniques used by red team operators and common cyber adversaries, and the ways the defensive teams can detect and even get ahead of these malicious actions.