Information Security & Ethical Hacking Tutorials Tutorials

Sample photo

Penetration Testing and Ethical Hacking

To assess the strength of your organization’s cybersecurity posture, you need to gather information, perform scanning and enumeration, and show how an adversary could hack into your systems. This ethical hacking course will give you those skills and prepare you for related certification exams so you can prove your capabilities.

Sample photo

Be A White Hat Hacker and Pen Tester

Become a white hat hacker and learn all the practical techniques for penetration testing with this amazing course which will provide conceptual framework to your security training. The course not only covers theoretical concepts but cover the practical demonstrations of various tools like Metasploit , Scapy and WireShark.

Sample photo

Learning Exploitation with Offensive Computer Security 2.0

After months of preparation, we are pleased to announce the official release schedule for Dr. Owen Redwood’s Offensive Computer Security (OCS) 2.0! This iteration of the course includes new content, all-new lectures, and all-new exercises. A video trailer of the material has been provided in this post as an outline of the examined topics. We've also included a brief summary of the access tiers, as there are free, teacher's, and professional packages available. Free and Teacher's packages are completely free. Verified educators may request rubric information and exams. When requesting course documents, please include verification of professorship and use an official collegiate .edu email address.

Sample photo

Assembly Language Megaprimer for Linux

Description: In this video series, we will learn the basics of Assembly Language programming on Linux. This will help us in doing reverse engineering and writing exploits in later videos. I will be start from the absolute scratch, so no pre-requisites required.

Sample photo

Network Security - Protocols

This is the 5th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.
here is rest of the Courses --> https://www.edx.org/search?q=hacking+and+security&tab=course

Sample photo

Network Security - Advanced Topics

This is the 6th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.