List All Categories
Offensive Security softver
Offensive Security CTP v.1.0 + 30 days CTP Lab access + certification
Cracking The Perimeter
Online Security Training
Our Cracking The Perimeter (CTP) online security course combines a unique blend of penetration testing skills for one purpose: how to bypass security. The field of pentesting is constantly evolving. Both security awareness training and more secure technologies are on the rise. The bar required to “crack” the organizational perimeter is constantly being raised. Public exploits and weak passwords rarely do the job, which requires the attacker to have an expanded set of advanced hacking techniques in order to successfully complete a real-world pentest.
In the CTP course, we will examine several advanced attack vectors, and how to bypass security settings based on real world scenarios we have encountered from our pentest engagements. In addition, we will cover some “special features” of Kali Linux designed to save you time and effort.
Topics such as cross-site scripting, directory traversal, anti-virus avoidance, how to manually obfuscate shellcode, and much more will be covered in a high-level of detail. Students will learn how to combine imaginative thinking and ethical hacking techniques with their own customized attack vectors to bypass security of their targeted systems. Cracking The Perimeter is among the most challenging ethical hacking and pentesting courses of its type.
Offensive Security Certified Expert (OSCE) Certification
The Offensive Security Certified Expert (OSCE) has an extremely challenging exam wherein students are required to demonstrate that they comprehend not only the material directly covered in the CTP course, but that they also fully grasp the underlying concepts presented throughout the course and can apply them in unknown situations. The OSCE exam challenges the students to prove that they have a clear and practical understanding of advanced penetration testing skills through an arduous forty-eight hour certification exam.
The OSCE exam consists of a dedicated vulnerable network, which is designed to be compromised within a 48-hour time period. The exam is entirely hands-on and is completed with the examinee submitting an in-depth penetration test report of the OSCE examination network. The coveted OSCE certification is awarded to students who successfully gain administrative access to systems on the target network.
Offensive Security KALI Netsecurity 32-Bit VM
Offensive Security Penetration Testing with Kali Linux Online + 30 days Lab access + Certification
Penetration Testing with Kali (PWK) is a self-paced online pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique penetration testing training course introduces students to the latest ethical hacking tools and techniques, including remote, virtual penetration testing labs for practicing the course materials. Penetration Testing with Kali Linux simulates a full penetration test from start to finish, by injecting the student into a target-rich, diverse, and vulnerable network environment.
Penetration Testing with Kali Linux is a foundational security course, but still requires students to have certain knowledge prior to attending the online training class. A solid understanding of TCP/IP, networking, and reasonable Linux skills are required. Familiarity with Bash scripting along with basic Perl or Python is considered a plus. This advanced penetration testing course is not for the faint of heart; it requires practice, testing, and the ability to want to learn in a manner that will grow your career in the information security field and overcome any learning plateau. Offensive Security challenges you to rise above the rest, dive into the fine arts of advanced penetration testing, and to Try Harder™.
What is an Offensive Security Certified Professional?
The Offensive Security Certified Professional (OSCP) is the companion certification for our Penetration Testing with Kali Linux training course and is the world’s first completely hands-on offensive information security certification. The OSCP challenges the students to prove they have a clear and practical understanding of the penetration testing process and life-cycle through an arduous twenty-four (24) hour certification exam.
An OSCP has demonstrated their ability to be presented with an unknown network, enumerate the targets within their scope, exploit them, and clearly document their results in a penetration test report.
WiFi Penetration Testing
Online Security Training
Offensive Security Wireless Attacks (WiFu) is an online penetration testing training course which teaches you the skills needed to audit and secure today’s wireless devices. In this course, students will learn to identify existing vulnerabilities in wireless networks and execute organized wifi attacks in a controlled and focused manner.
The wireless industry continues to grow in leaps and bounds with more and more gadgets adding wireless functionality. Wireless access points, media centers, phones, and even security systems are commonplace in the average household. Unfortunately, the wireless security that is implemented on this equipment is often lacking, opening the devices to severe wireless security vulnerabilities. In practice, many companies and organizations still use and deploy vulnerable wireless gear, often in their default configurations. This is most often due to poor security awareness or a lack of understanding of the risks and ramifications.
The Offensive Security WiFu Security Training Course is a must for any professional penetration tester!
What is the OSWP Certification?
The Offensive Security Wireless Professional (OSWP) is the only practical wireless attacks certification in the security field today. The OSWP challenges the students to prove they have the practical ability to perform 802.11 wireless audits using open source tools through a hands-on, four-hour certification exam.
The OSWP exam consists of several dedicated wireless networks with various configurations and vulnerabilities. The examinees are tasked with identifying, analyzing, and attacking each of the wireless networks presented to them, with the goal of gaining access to the network encryption keys.
The student must submit the correct encryption codes for all networks, as well as the attack vectors used to obtain them in order to be awarded the OSWP certification.
Offensive Security CTP v.1.0 + 60 days CTP Lab access + certification
Offensive Security CTP v.1.0 + 30 days CTP Lab access + certificationű
Offensive Security CTP Lab access – extension of 60 days
Offensive Security CTP Lab access – extension of 30 days
Offensive Security OSCE – Certification retake
Offensive Security KALI Netsecurity 32-Bit VM
Offensive Security KALI Netsecurity 64-Bit VM
Offensive Security Penetration Testing with Kali Linux Online + 30 days Lab access + Certification
Offensive Security Penetration Testing with Kali Linux Online + 60 days Lab access + Certification
Offensive Security Penetration Testing with Kali Linux Online + 90 days Lab access + Certification
Offensive Security PWK Lab access – extension of 90 days
Offensive Security PWK Lab access – extension of 60 days
Offensive Security PWK Lab access – extension of 30 days
Offensive Security PWK Lab access – extension of 15 days
Offensive Security Upgrade from PWB v.3.0 to PWK
Offensive Security Upgrade from PWB v.2.0 to PWK
Offensive Security Upgrade from PWB v.1.0 to PWK
Offensive Security OSCP – Certification retake
Offensive Security Android Developer’s Desktop Remix Version 2.0.0
Offensive Security LAMP Server 32-bit Version 3.0.2
Offensive Security GOLEM 13.2.8 desktop OS 64-bit.x86 64-13.2.9
Offensive Security Upgrade to Wireless Attacks v.3.0
Offensive Security OSWP – Certification retake
DocuSek
What is DocuSek?
DocuSek is an online document protection and storage service that lets you store your documents in the cloud – securely and effortlessly.
We created DocuSek for companies who plan to move away from paper based document storage to a digital, online storage. If you want to keep your documents in both physical and digital forms, our service is also ideal for you.
We offer a system that makes it easy to find and download an original version of your document or share watermarked copies of the same document. It also helps you to find the original paper document by being able to link digital and physical copies together.
What’s more, your documents are stored in the cloud - in highly redundant storage facilities across the globe with lighting fast retrieval times and proprietary security measures.
In today’s world securing your documents can be crucial. It is a critical feature both to you and your clients. Often, the safest means to store your data is on paper locked away in a storehouse. But it doesn’t have to be that way.
DocuSek aims to bring you a new kind security. So how exactly is your data secured with DocuSek?
When your document is ready for upload in a digital form, our service not only encrypts it with the highest possible encryption allowed by law – we also distribute parts of the document randomly across continents. Your document is heavily encrypted and also sliced into many small pieces. It’s as if you would tear it up and store the various pieces behind high security vaults around the globe, without anyone knowing where the individual pieces are.
That includes us too. Our engineers are not able to peek into your files. We are unable to comply with anyone asking us for your documents - it's just not possible.
In the end, even we cannot tell what pieces belong to which document and how to decrypt them. Nor can anyone else. We conform to international digital encryption law, but we do it in a way that nets you with the best, legally possible security measures along with a highly redundant data storage at a very affordable price.
Secure. DocuSek employs an array of security measures to make sure that nobody but you and whom you authorize is able to access your documents.
Distributed. Walking hand-in-hand with security, every single document you upload is randomly sliced and distributed in storage plants across the globe. Only with your personal hardware key is it possible to decode where the various pieces of your document are.
Redundant. We offer an extremely high level of redundancy by storing duplicates around the world, making it virtually impossible for a document to become lost due to hardware failure. We are convinced that your documents would remain safe and sound in most vis major events we can imagine.
Reliable. We offer 99.99% availability. There are no single points of failure.
Scalable. We created this system to be able to withstand and scale with your interest and usage. The service can handle storing documents for individuals as well as the largest of companies.
Fast. Uploads to the system are distributed across several world regions while downloads make use of an even larger global network of edge locations. Uploads happen directly to these vaults, there are no proxy bottlenecks on the way.
Simple. Using our web based administration interface, it becomes an easy task to secure your files or find a document – whether a digital or a physical version.
It is also a simple task to share your documents with your clients, yet our solution makes it possible for you to do that within constraints. Who you share documents with, for how long and in what format – your call.
Office 365
Why Office 365?
Fully installed apps on PC, Mac, and tablets • Extra cloud storage • Always up to date
Whether you're working or playing, Microsoft is here to help. We’re the company that created Microsoft Office, including Office 365 Home, Office 365 Personal, Office Home & Student 2016, Office Home & Business 2016, and Office Professional 2016. You can also get Office for Mac. Whatever your needs—whether professional or simply for fun—we've got you covered.
Now take Office with you wherever you go, across all your devices with Office 365. An Office 365 subscription gives you access to the latest versions of Word, Excel, PowerPoint, Outlook, OneNote and more on your PC, Mac, tablet or smartphone. You also get 1TB of OneDrive cloud storage for your photos, videos and documents, plus 60 minutes of Skype calls per month and tech support from Microsoft-trained experts at no extra charge.
The powerful software in Microsoft Office 2013 remains in Microsoft Office 2016, including features and shortcuts for the things you do most often, like creating professional-looking presentations, working on spreadsheets, or word processing. And because Office 2016 allows you to open, save, modify, or collaborate on documents in the cloud, you can maximize efficiencies and do great work anywhere, anytime. Microsoft Office is much more powerful and comes with better support than free software, like Open Office or Google Docs.
If you have an earlier version of Office, including Office Home & Student 2013, Office Home & Business 2013, and Office Professional 2013, it’s time to upgrade to Office 365 or Office 2016. Browse our Microsoft Office products and find the perfect solution to your home and business needs.
VASP
What is VASP?
The Vienna Ab initio Simulation Package (VASP) is a computer program for atomic scale materials modelling, e.g. electronic structure calculations and quantum-mechanical molecular dynamics, from first principles.
VASP computes an approximate solution to the many-body Schrödinger equation, either within density functional theory (DFT), solving the Kohn-Sham equations, or within the Hartree-Fock (HF) approximation, solving the Roothaan equations. Hybrid functionals that mix the Hartree-Fock approach with density functional theory are implemented as well. Furthermore, Green's functions methods (GW quasiparticles, and ACFDT-RPA) and many-body perturbation theory (2nd-order Møller-Plesset) are available in VASP.
In VASP, central quantities, like the one-electron orbitals, the electronic charge density, and the local potential are expressed in plane wave basis sets. The interactions between the electrons and ions are described using norm-conserving or ultrasoft pseudopotentials, or the projector-augmented-wave method.
To determine the electronic groundstate, VASP makes use of efficient iterative matrix diagonalisation techniques, like the residual minimisation method with direct inversion of the iterative subspace (RMM-DIIS) or blocked Davidson algorithms. These are coupled to highly efficient Broyden and Pulay density mixing schemes to speed up the self-consistency cycle.
And what can VASP do?
The following is a (by no means complete) list of VASP features:
Functionals
LDA, GGAs, metaGGAs
Hartree-Fock, Hartree-Fock/DFT hybrids
First derivatives
Forces and stress tensor for DFT, Hartree-Fock, and hybrid functionals
Dynamics and relaxation
Born-Oppenheimer molecular dynamics
Relaxation using conjugate gradient, Quasi-Newton or damped molecular dynamics
Nudged elastic band methods (transition states search)
Climbing dimer method (transition state search)
Magnetism
Collinear and non-collinear
Spin-orbit coupling
Constrained magnetic moments approach
Linear response to electric fields
Static dielectric properties
Born effective charge tensors
Piezoelectric tensors (including ionic contributions)
Linear response to ionic displacements
Phonons
Elastic constants (including ionic contributions)
Internal strain tensors
Optical properties
Frequency dependent dielectric tensors in the independent particle approximation
Frequency dependent tensors in the RPA and TD-DFT
Cassida's equation for TD-DFT and TD-Hartree-Fock
Berry phases
Macroscopic polarization
Finite electric fields
Green's function methods
GW quasiparticles
ACFDT total energies in the RPA
Many-body perturbation theory
2nd-order Møller-Plesset perturbation theory
Page 1 of 2