Volume 1 : Learn how to stop hackers, prevent tracking, advanced anonymous browsing and counter government surveillance
It’s time to put in practice your detective skills! By using Virustotal Intelligence, we teach you how to hunt for malware, how to decompile VBA macros with Didier Steven tools to identify C&C Servers, how to cluster similar samples by running retrohunt, ssdeep or vthash scans, then we introduce Viper framework that help us to correlate and document the full attack flow, finally we walk you through techniques to identify the threat actors behind the attack and how to track their future movements! And finally how to take down the domain by using a technique called Sinkholing!
This VTC course delivers an in-depth look at wireless security, demonstrating how IEEE 802.11 wireless attacks are carried out and defended against. Veteran instructor Bobby Rogers first provides a foundation in wireless security technologies before he proceeds with practical demonstrations on securing both clients and network devices. He also demonstrates how to monitor wireless networks, capture wireless traffic, and even crack WEP and WPA keys