Infosec Boot Camps offer live, instructor-led cybersecurity and IT certification training in-person or online.
Infosec Self-Paced Training accommodates your schedule with instructor-guided, on-demand training.
Infosec Immersive Boot Camps kickstart cybersecurity careers with tailored training in as little as 26 weeks.
Infosec Skills provides on-demand cybersecurity training mapped to skill or role paths for any level.
Advance your team's cybersecurity skills with our customizable, industry-recognized programs and take advantage of our team training discounts.
We offer multiple ways to save when it comes to training and certifying your team.
Empower employees with knowledge and skills to stay cyber secure at work and home with 2,000+ security awareness resources.
Our human risk management solution, Infosec HRM, powered by Right-Hand Cybersecurity, increases visibility into security risk and provides alert-based training nudges to improve employee behaviors and decrease security events.
Security education to the right people from IT and security staff to the C-suite and every employee.
Skills and certifications your team should get next with training mapped to NIST and NICE Frameworks.
Flexible, scalable training solutions that add value to your client services portfolio and reduce business risk.
We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber safe at work and home.
SecVulture is an Information Security professional with experience in Web, Thick client and Mobile Application Security, currently working with Infosec Institute as a researcher.
Email: secvulture@gmail.com
October 31, 2016
In the previous article, we have discussed source code review of .NET applications. Readers are introduced to a tool called Visual Code Grepper, which can he
September 28, 2016
Practical Thick Client Application Penetration Testing using Damn Vulnerable Thick Client App: Automated Source code review Background: In the previous arti
September 26, 2016
Background: In the previous article, we have discussed the basics of DLL Hijacking vulnerabilities and how one can find and exploit DLL Hijacking vulnerabi
September 23, 2016
Background: Welcome to the part 7 of Practical Thick Client Application Penetration Testing using Damn Vulnerable Thick Client App (DVTA). In the prev
September 21, 2016
Background: [pkadzone zone="main_top"] In the previous article, we have discussed how .NET applications can be Reverse Engineered using dotPeek to vie
September 19, 2016
Background In the previous article, we have discussed injection attacks in Thick Client Applications specifically in DVTA. In this article, we will di
September 8, 2016
Background: In the previous article, we have seen some of the common data storage issues in Thick Client Applications specifically in DVTA. In this article,
September 6, 2016
Practical Thick Client Application Penetration Testing using Damn Vulnerable Thick Client App: Insecure Data Storage Background: Welcome to part-3 of thick
August 30, 2016
Background: In the first part of this series, we have seen an introduction to Thick Client Applications, set up Damn Vulnerable Thick Client Application and
August 25, 2016
Though, thick client applications are not new, penetration testing process for thick clients is not as straight as Web Application Penetration testing. It is