eLearnSecurity Blog

Blog

Video: Sneaky Man in the Middle Attack Demo

sneaky MITM attack webinar

A Man in the Middle (MITM) attack is a type of attack where the hacker gets in the middle of a communication between the victim and the server/service.

Our rockstar IT security researcher, Davide “GiRa” Girardi, shows you how to launch an advanced Man in the Middle (MITM) attack even if the network is using static ARP tables or if dynamic ARP inspection is enabled.

Tags: , , , , ,

Read more

How to Become an Elite Pentester

Elite-Pentester-Bundle

This month, we are bundling two of our best-selling online training-courses together, Penetration Testing Professional to learn network pentesting and Web Application Penetration Testing to learn web app pentesting. These two courses are in the Elite Edition and we call it The Elite Pentester Bundle.

Tags: , , , , ,

Read more

Apple App Store Compromised by XcodeGhost Vulnerability

iphone hack

Apple’s App Store has been compromised and millions of affected iPad and iPhone users are at risk. A vulnerability named XcodeGhost has been reported which functions by adding malicious code to mobile applications that have been built with an infected version of Xcode – Apple’s development environment for iOS.

Tags: , , , , , , ,

Read more

Top 5 Things to Do When Your Trusted IT Professionals Leave

insider threat cybersecurity

Businesses and organizations spend billions to protect data from cyber attacks across the Internet. Another thing that you should consider are threats coming from the inside. Staff-related security breaches such as that of Morgan Stanley investment firm and Ashley Madison site where the CEO tells the possibility of the hack done by an insider tells us to always keep our guards on – even from our own staff. 

Tags: , , , ,

Read more

Nothing to Hide – You can now test all our training courses before you enroll!

nothing2hide-elearnsecurity

Would you buy a car without doing a test drive first? Probably not. Today eLearnSecurity raises the bar in IT Security training again as we offer a free test-drive of every course before you enroll. Test-drive these hands-on training courses by clicking the link below. You will be redirected to the page where you can request for a demo access of the corresponding course!

Tags: , , , , , , , , ,

Read more

Go to top of page