eLearnSecurity Blog

Tag: network security

6 years eLearnSecurity: 20 Days of Celebrations!

eLearnSecurity is turning 6 years old this month! And we are celebrating this birthday with our students!

Facebook_Cover

 

 

 

 

 

 

 

During the next 20 days, until the end of April 2016, you can get 20% off any new course enrollment. 

Tags: , , , , , , , , , , , , , , , , ,

Read more

Video: Hardening Endpoints Demo

Hello, everyone!

This video about hardening the endpoints is taken from our “Practical Network Defense” training course PND.

PND is one of eLearnSecurity’s hands-on IT Security training courses, which covers the defensive side of network security. These skills are highly valuable for both the defense team and offense team.

Tags: , , , , , , , , , , , ,

Read more

10 New Labs Activated in the Penetration Testing Professional v3 Training Course

PTPv3 training course new labs

Good news for all Students of our Penetration Testing Professional version 3 – PTPv3 training course. Our team of IT Security researchers just activated 10 additional virtual labs! You can now practice even more challenging scenarios covering network security and web application security.

Tags: , , , , , , , , ,

Read more

Free Edition Upgrades for all our IT Security training courses until end of November 2015

IT Security training course upgrades

This November, develop your offensive and defensive skills in network security, web app security, mobile app security, and software reverse engineering. Enroll into any of our exciting online IT security training courses and you will be upgraded to the next better Edition at no additional cost!

Tags: , , , , , , , , , , , , , , , ,

Read more

Video: Sneaky Man in the Middle Attack Demo

sneaky MITM attack webinar

A Man in the Middle (MITM) attack is a type of attack where the hacker gets in the middle of a communication between the victim and the server/service.

Our rockstar IT security researcher, Davide “GiRa” Girardi, shows you how to launch an advanced Man in the Middle (MITM) attack even if the network is using static ARP tables or if dynamic ARP inspection is enabled.

Tags: , , , , ,

Read more

How to Become an Elite Pentester

Elite-Pentester-Bundle

This month, we are bundling two of our best-selling online training-courses together, Penetration Testing Professional to learn network pentesting and Web Application Penetration Testing to learn web app pentesting. These two courses are in the Elite Edition and we call it The Elite Pentester Bundle.

Tags: , , , , ,

Read more

How to Become a Professional Network Penetration Tester

Network Penetration Testing training courses

This July, we leave you no room for excuses as we offer you our hands-on Network Penetration Testing training courses – Penetration Testing Professional v3 (PTPv3) and Penetration Testing Student v3 (PTSv3).

Everyday, we hear news and stories of data breaches in various companies.

Tags: , , , ,

Read more

Tips to Prevent Cyber-Security Breaches

Tips to Prevent Cyber-Security Breaches

It’s just the start of a new year and already three companies have been reported to have suffered Security breaches – restaurant chain Chick-Fil-A, bit-coin exchange Bitstamp, and investment firm Morgan Stanley.

Aside from the widely publicized Sony Hack reported late last year 2014, new headlines have been added to the list of cybersecurity victims.

Tags: , , , , , ,

Read more

Retail Companies: 5 Tips to Strengthen Your Network Security

retail store

Physical stores have become victims of customer credit and debit card breach. In the last year, there were about 20 retailers compromised by a major security threat, this is according to a study by security firm BitSight. In a survey of 300 retailers by the same firm, it was revealed that 58 percent of the companies had worse security performance than in 2013.

Tags: , ,

Read more

Go to top of page