This is your complete guide to help get you started in your cybersecurity career!
The Art of Hacking is a series of videos that will help you get started in your cybersecurity career. Learn the core principles and fundamentals of security penetration testing and ethical hacking. This series of videos will show you how to do real-life scenarios, complete demos, and deep dives. This series will show you how an ethical hacker conducts initial reconnaissance on a victim to assess security systems and network security.
These courses are a comprehensive guide for security professionals who want to start a career in ethical hacking or penetration testing. It can also be used to help individuals prepare for the Offensive Security Certified Professional, the Certified Ethical Hacker and any other ethical hacking certification. This series was created to help you understand hacking concepts and methods, as well as the skills necessary to become a professional ethical hacker.
These courses include:
- LiveLessons Security Penetration Testing (The Art of Hacking Series).
- Wireless Networks, IoT and Mobile Devices Hacking (The Art of Hacking Series), LiveLessons
- LiveLessons: Enterprise Penetration Testing (continuous Monitoring) and Enterprise Penetration Testing (the Art of Hacking Series).
- Hacking Web Applications: The Art of Hacking Series LiveLessons Security Penetration Testing for Today’s DevOps Environments and Cloud Environments
About the Authors
Omar Santos, an active member in the security community, is responsible for several industry-wide initiatives as well as standard bodies. His active role assists businesses, universities, law enforcement agencies, as well as other participants who are committed to improving the security of critical infrastructure. Omar is the author or more than 20 books, video courses, white papers, articles, best practices in security configuration. Omar is a Principal Engineer at Cisco's Product Security Incident Response Team, (PSIRT), where he mentors, lead engineers and incident managers in the investigation and resolution security vulnerabilities. Omar has been quoted in numerous media outlets including Wired, ZDNet ThreatPost, ThreatPost and TechCrunch. Omar gives presentations at conferences all over the globe. Follow Omar on Twitter @santosomar
Chris McCoy works as a technical leader within Cisco's Advanced Security Initiatives Group. He has more than 20 years of experience working in the security and networking industry. He is passionate about computer security and has designed mitigations to stop motivated and resourceful adversaries. He previously worked for Spirent Communications, and the U.S. Air Force. He has been CCIE certified in both Routing & Switching and Service Provider tracks for more than 10 years.
Jon Sternstein, the Founder and Principal Consult of Stern Security, a security firm that focuses on healthcare and credit unions. Jon has contributed to the security of many organizations in healthcare, finance, legal and government over his 13+ year career in the security industry. He is the co-chair of the Privacy and Security Workgroup of the North Carolina Healthcare Information and Communications Alliance. Jon was the former president of the BSides Raleigh Security Conference. Stern Security's website: https://www.sternsecurity.com
Ron Taylor is an Information Security professional who has been working in the field for nearly 20 years. Ten years of his time were spent in consulting, where he gained extensive experience in many areas. He joined the Cisco Global Certifying Team in 2008 as an Information Assurance SME. He was promoted to the Security Research & Operations group in 2012, where he focused primarily on penetration testing Cisco products and services.
Ron was also involved with the development and presentation of security training for internal development and test teams worldwide. He also provided consulting support to many product teams, as an SME in product security testing. He is currently a Consulting Systems Engineer, specializing in Cisco security products. GPEN, GWEB and GCIH are his certifications. Ron is also a Cisco Security blackbelt, a SANS mentor, Cofounder and President of Raleigh BSides Security Conference and a member of the Packet Hacking Village at Defcon.
Who Should Take This Course
- Any network and security professional interested in a career in ethical hacking or penetration testing
- Individuals who are preparing for CompTIA PenTest+, the Certified Ethical Hacker(CEH), Offensive Security Certified Professionals (OSCP), and any other ethical hacking certification
- Any cyber security professional who is interested in learning the skills necessary to become a professional ethical hacker, or who is interested in learning more about security penetration testing methodologies and concepts.
Course Requirements
Basic knowledge of cybersecurity concepts and technologies is required.
Table Of Contents
- LiveLessons Security Penetration Testing (The Art of Hacking Series).
- Wireless Networks, IoT and Mobile Devices Hacking (The Art of Hacking Series), LiveLessons
- LiveLessons: Enterprise Penetration Testing (the Art of Hacking Series), Continuous Monitoring and Enterprise Penetration Testing
- Hacking Web Applications: The Art of Hacking Series LiveLessons Security Penetration Testing for Today’s DevOps Environments and Cloud Environments