As a life-long learner, and someone who is passionate about both bettering myself and helping others to reach higher and achieve their goals, I’m constantly on the lookout for fresh educational materials particularly in the areas of IT Administration and Security. I’m always amazed at the breadth of knowledge that is available, albeit, often at a substantial cost. I’m even more amazed at the amount of free content available but can’t help but be anxious about the quality, validity and dubious characters claiming to be experts just because they have a YouTube Channel. I’ve recently had the opportunity to get an up-close look at Cybrary, a relatively new online training provider with some known instructors. Oh… And before I forget, I should mention – they’re FREE! Could this be the best of both worlds?
Cybrary’s goal is spelled out very clearly when they describe “Our Revolution” throughout their site. They state, “We believe IT and Cyber Security training should be free, for everyone, forever. We believe that everyone, everywhere, deserves the OPPORTUNITY to learn. What they do with the opportunity is up to them, but the opportunity should be available. Join us in demanding liberation, help us in forcing change.” That’s all well and good. But how’s the actual training?
eLearnSecurity has long been a trusted training provider with multiple courses on offer. They recently updated their Penetration Testing – Student (PTS) course. The eLearnSecurity PTSv3 course is tailored for beginners. In addition to a brand new version, they also made available a new pricing structure that includes an Elite Edition, a Standard Edition and a free Bare Bones Edition. The Bare Bones Edition includes lifetime access to the training materials as well as email tech support. For a full rundown of the difference between the editions, click here.
Unfortunately, this is available only to those with an invitation. Luckily, we scored 100 seats in the invite-only free version of the eLearnSecurity PTSv3 Course. And this time there are no gimmicks, no contests, no requirements. It is simply a first come, first served deal for EH-Netters. Read on for the code that gives you access as well as some more details on the new pentesting course. This is for a limited time, so HURRY!!
This highly technical forum showcases eye-opening presentations from world-renown ethical hackers and epic security ninjas which will leave you amazed and frightened at the same time. By giving you access into the mind of a hacker, you will better understand how to protect your networks and critical data. As we always say “In order to beat a hacker, you have to think like one” and “if you don’t understand the enemy, how can you protect against him?” ShowMeCon 2015 pulls back the curtain and exposes how hackers are winning the war on physical and cyber security on June 8 & 9.
Before the con from June 3 – 7 several boot camps will be provided by Hacker University including hands-on hacking, router hacking, network defense, the updated CISSP certification and more. This is where you EH-Netters come in. Participate on EH-Net in our forums and through social media, and you could win one seat in the training course of your choice which also includes a ticket to the con (travel not included). With a value of well over $2200 and a wealth of professional activities, this opportunity should not be missed. We’ll be watching for the entire month of March and decide on a winner in early April. So get out there and support the community, and you could be the next big winner of EH-Net’s Giveaways!! Read on for more details of the courses and the event. Good luck.
“Hacking and Penetration Testing with Low Power Devices” by Philip Polstra is an excellent read. The author bases this book on his experiences in both hardware, software and penetration testing and combines the various disciplines to both educate and enlighten the reader. Ultimately, the subject matter revolves around using the BeagleBone Black and a customized ARM penetration testing Linux distro, which Polstra’s dubbed ‘The Deck,’ to perform various types of hacking activities. It’s described as, “A practical guide to performing penetration tests from a distance with low-cost, battery-powered devices.” Oh yeah… just what the doctor ordered.
Let me open by saying that this book struck my “techie geek” nerve. Years and years ago, not too long after I became a computer guy, but far before becoming a professional penetration tester, I managed a Radio Shack store (sad to see they’re going away). I guess you could say I was a maker before it was called that. This book, while discussing pentesting, code, automation and stealth, offers the reader a great experience as he brings them into a world of hardware manipulation, discussions of power consumption, radio communication, and other really cool topics. It truly embraces the mindset of the hacker in a cross-disciplinary way and acts like a perfect bridge for those currently in the computer hacking arena into the exciting wider world of the maker movement. I’m excited to share this experience with you, so let’s get to it.
After a long love affair with Ruby, I was excited to get back into more Python in the new year. One of my main goals was to build additional skills with Python, and continue to build up skills in defense and response. When “Python Forensics: A workbench for inventing and sharing digital forensic technology“ by Chet Hosmer came out, I was excited about all of the possibilities. There are a number of books about using Python for attacking, but a strong book on building forensics tools is a nice change of pace.
Python Forensics target audience is “anyone who has a desire to learn how to leverage the Python language to forensic and digital investigation problems.” Hosmer hits the target audience well by both having introductory sections that go over some Python basics as well as a number of cookbook-style chapters that have programs to perform a number of different forensic functions. Let’s take a closer look at this Syngress Publishing title.
We Have a Winner of SANS vLive!!
The year is at an end, the mercury is dropping quickly and yet we have reason to celebrate. EH-Net member SephStorm has earned this great prize and thus will have a head start into the 2015 of his dreams. He has won one free 2015 vLive course from SANS Institute, the most trusted source for information security training, certification and research. vLive courses meet live online twice each week for six weeks and include six months on online archive access. Each vLive course is taught by a top SANS instructor in an interactive online classroom, includes all of SANS’ standard course materials, and never requires travel.
Didn’t win this time? No worries. EH-Netters still get
$150 OFF Any SANS Course in Any Format
with Coupon Code: SANS_EHN150
Congratulations and many thanks for your continued contributions to EH-Net and the wider security community. The winner was chosen from the group of those most prolific in the EH-Net Community Forums. This month’s giveaway was worth $4615 – $5350, so well done! We’ll do it again soon.
“Georgia, Georgia…” The tune “Georgia on My Mind” was spinning through my head when I was given the chance to review “Penetration Testing: A Hands-On Introduction to Hacking,” a book by Georgia Weidman from No Starch Press. Having watched some of her conference presentations online and knowing the work she’s put into the Smartphone Pentest Framework (SPF), I’ve been looking forward to the opportunity to dive into the book for a while now, and her enthusiasm and efforts made it a worthwhile wait. Amazon’s book description includes the following:
“In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment – including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.”
So with the new year upon us, this gives everyone the opportunity to dive into a topic whether it be for advancing your current career, jumping into a new one or simply to amaze your friends and families. Hacking news both good and bad are everywhere these days. It’s time for you to get into the game. Find out how Ms. Weidman can help.
Dark Side Ops: Custom Penetration Testing enables participants to “break through” to the next level by removing their dependence on 3rd-party penetration testing tools, allowing for outside-the-box thinking and custom tool development designed specifically for the target environment.
Dark Side Ops (DSO) is a course on targeted attacks, evasion, and advanced post exploitation… with a twist. The thesis of DSO is this: if you want to credibly simulate a real world attacker, you need advanced capability. You can’t do this with unmodified open source tools. This course teaches students how to build and modify advanced capabilities. Let’s take a closer look.