The Certified Secure Premium Content grants access to extra challenges, videos, downloads and tools. If you are looking for extra information or if you simply want more online challenges, you will find it here. You can recognize Premium Content by the white Premium Content icon.
Prices indicated on the website are including VAT and subject to price changes.
Make it official! Order a hardcopy of your certificates, bearing the original Certified Secure seal. Delivered by Dutch postal service.
1x
Order€ 5,00
Order a hardcopy of your certificates. Printed on paper with vintage paper texture and Certified Secure watermark. The certificates bear the original Certified Secure seal. Delivered by Dutch postal service within five working days.
Package Contents:
Hardcopy certificates bearing seal
Easy peasy! This gigapack contains all the premium content (including challenges and instructions video's) available on our website.
38x
16x
6x
OrderEasy peasy! This gigapack contains all the premium content (including challenges and instructions video's) available on our website.
This pack covers the following content:
- Instruction Path Traversal
- Instruction SQL Injection
- Bootcamp: Essential Security
- Instruction Cross Site Scripting
- Instruction Port en Version Scanning
- Bootcamp: Security Specialist
- Instruction Cross Site Request Forgery
- Instruction Command Injection
- Bootcamp: Web Security Specialist
- Powerpack: Server Security Specialist
- Powerpack: Security Aware Administrator
- Powerpack: Security Aware Programmer
- Powerpack: Forensic Specialist
- TMI Challenge
- Hidden Message Challenge
- Private Messenger Challenge
Package Contents:
This instruction video discusses the importance of software updates and shows how to verify them. This instruction video explains the basic principles of SQL and SQL Injection. After watching this video you should be able to perform basic SQL Injections without difficulty. This instruction video explains the basic principles of Cross Site Scripting. After watching this video you should be able to successfully complete the Cross Site Scripting challenges. This instruction video explains the basic principles of port and version scanning. After watching this video you should be able to perform basic port and version scans without difficulty. This instruction video demonstrates Cross Site Request Forgery, also known as XSRF, using a Certified Secure challenge. This instruction video discusses two security problems on websites: Command Injection and uploading files. This instruction video demonstrates how to analyze network traffic. This instruction video demonstrates how to capture network traffic. This instruction video demonstrates how to make a forensic copy of a hard disk. This instruction video demonstrates how to analyze a hard disk. This instruction video shows how UDP Port Scanning works and also discusses the difference from TCP. This instruction video discusses three security issues for servers: mail, FTP and passwords. This instruction video illustrates how user input can be validated before it is used in SQL queries, file names or HTML. In this instruction video the storage of passwords by using hashing, salts and stretching is discussed. This instruction video demonstrates how to configure a firewall. Some useful tips are included. This instruction video explains the basic principles of Path Traversal. In the video the challenge "Herman Vluchtbeveiliging" is used for demonstration purposes. On the Bachelor website you can upload a picture and profile. Compromise the site and execute the command 'victory' to complete the challenge. This is an easy one! Find all open TCP ports and execute the "/secret" command on the remote server to score 100% for this challenge. In this challenge you use the special
'Firewall builder' tool to design a basic firewall for use at home. When the firewall meets the requirements you complete the challenge. A set of firewall rules is presented to you. Al you have to do is put them in the right order. You complete the challenge if the rules are in the right order and the firewall works. A customer wants you to design a more advanced firewall for his network. You complete the challenge if the advanced firewall meets the requirements. If you have good understanding of iptables you should be able to complete this challenge successfully without difficulty. With the use of an editor you have to edit PHP code that contains many SQL Injections.
By clicking the 'SECURITY TEST' button the system checks if the problems are solved. You complete the challenge if all problems are solved. With the use of an editor you have to edit PHP code that contains Path Traversal.
By clicking the 'SECURITY TEST' button the system checks if the problems are solved. You complete the challenge if all problems are solved. With the use of an editor you have to edit some PHP code that contains Cross Site Scripting.
By clicking the 'SECURITY TEST' button the system checks if the problems are solved. You complete the challenge if all problems are solved. This vault application needs some authentication. Build it to secure the vault. An automated test checks if the authentication is valid and determines if the challenge is completed. The Trace application executes a trace route on an IP address. Compromise the server and execute the command 'victory' to complete the challenge. Honest Achmed is a very secure Certificate Authority. Obtain the verification code, bypass the authentication and create an SSL certificate to score 100% for this challenge! There are five chess boards active in this challenge. Three boards are protected by a password. You complete the challenge if you make a move on these boards. This Tetris Challenge is secured by a password. Bypass the authentication and score 100.000 points to complete the challenge. Sharing is caring! This new online paste tool is built on OpenStack. Recover the OpenStack password to score 100% for this challenge! You can only access the Secret Spy website by the means of special HTTP headers. Gain access and complete the challenge! The fictional company Fasttrack has installed a new project management system. Log in as admin to complete the challenge. Find and identify UDP services on an IP address. You complete this challenge by identifying all services correctly, should be really easy! Use the Hydra Tool to retrieve Barbara's password. The mail server in this challenge has a configuration problem. Demonstrate this problem by using the mail server as open relay. To complete this challenge you have to upload a file using anonymous FTP. A true forensic expert is capable of identifying the owner and location of any IP address. Check the WHOIS information to find out who is the owner of the IP address and also where he or she is located. Find the owner of five different IP addresses and score 100% on this challenge. Maarten's Security Shop was compromised. Analyze the hard disk to find out which attacks were executed.
Calculate multiple hashes. You complete this challenge when you are able to calculate MD5, SHA1, SHA256 and SHA512 hashes. Analyze three pcap files using Wireshark.
Subsequently you have to answer a number of questions about the attacks that were executed. The Private Messenger Service is used to send private messages. Gain access to a Private Message Inbox, upgrade an account to Premium and score 100% for this challenge. Keywords: XSS, XSRF, JAVA. Do you know your encryption classics? Recognize the 10 different basic encryption techniques and decipher the hidden messages. Start the Hidden Message challenge and score 100%! With the upcoming TMI PhotoShare app you will be able to share your photos and favorite moments with the world! The app is currently in beta. You are hired to perform a BlackBox penetration test. Bypass the beta-check, upload a photo, extract the EXIF information and gain access to the hidden admin interface. Keywords for this challenge are: Tricky, Exif, Blackbox. This new version of the My Password challenge is based on the Portable Password vault. Gain access to the vault to score 100% for this challenge! In this new version of the Avatar challenge you can create your own virtual avatar! Use Cross Site Request Forgery to make people automatically vote for your avatar. You score 100% when your avatar has at least ten votes. The fictitious Security Shop website offers a number of interesting products. Unfortunately they didn't pay too much attention to the security of their own website. You complete this challenge by reading the admin password from the database. The treasure challenge is your guide to all must-have treasures. You complete this challenge if you are able to gain access to the admin interface and add you own treasure to the map. Herman may be a security specialist, his website is not secure at all! Obtain the content of the /etc/passwd file to illustrate this. This Premium Challenge invites you to gain access to the members only section of the Hacker Comedy and Tragedy club. There are a total of 7 different (SQL Injection or Path Traversal) vulnerabilities in the Hackblog Challenge. Find them all to score a whopping 100% for this challenge! The Breakfast Club is famous for the Hacker's Breakfast! Your task is simple, uncover the secret recipe and score 100% for this challenge (and a great breakfast)! Find and identify services on three different IP addresses. You complete this challenge by identifying five services correctly. The P2000 website shows emergency calls for police, fire department and ambulance.
You complete the challenge by getting access to the members-only section. This cheat sheet presents an overview of Path Traversal applications and provides some useful tips. This cheatsheet presents an overview of SQL Injection applications and provides some useful tips. This cheat sheet presents an overview of Cross Site Scripting applications and provides some useful tips. In this cheat sheet you will find an overview of the most common services and ports on the internet. In this cheat sheet you will find an overview of the most important iptables options and commands. List of frequently used passwords. Do you know your encryption classics? Recognize the 10 different basic encryption techniques and decipher the hidden messages!
1x
Order€ 2,50
The Hidden Message Challenge is all about encryption. Do you have a knack for encryption and are you able to recognize the classics? Then you will have a blast with the Hidden Message Challenge! Recognize the 10 different basic encryption techniques and decipher the hidden messages. Start the Hidden Message challenge and decrypt all the hidden messages to score 100% and gain 1000 Experience Points (XP).
Package Contents:
Do you know your encryption classics? Recognize the 10 different basic encryption techniques and decipher the hidden messages. Start the Hidden Message challenge and score 100%! The Private Messenger Service is used to send messages. Upgrade an account to Premium and score 100%. Keywords: XSS, XSRF, JAVA
1x
Order€ 2,95
With the Private Messenger Service users can send private messages. The goal of this challenge is to gain access to a Private Message Inbox. Score 100% and gain 750 Experience Points (XP) by upgrading an account to Premium status. Keywords for this challenge are: XSS, XSRF, JAVA.
Package Contents:
The Private Messenger Service is used to send private messages. Gain access to a Private Message Inbox, upgrade an account to Premium and score 100% for this challenge. Keywords: XSS, XSRF, JAVA. The TMI PhotoShare app puts your life in the spotlight! Gain access to the admin interface to score 100%. Keywords: Tricky, Exif, Blackbox.
1x
Order€ 3,95
With the upcoming TMI PhotoShare app you will be able to share your photos and favorite moments with the world! The service is currently in beta and you are hired to perform a BlackBox Penetration Test. Bypass the beta-check, upload a photo, extract EXIF information and gain access to the hidden admin interface to score 100%. Keywords: Tricky, Exif, Blackbox.
Package Contents:
With the upcoming TMI PhotoShare app you will be able to share your photos and favorite moments with the world! The app is currently in beta. You are hired to perform a BlackBox penetration test. Bypass the beta-check, upload a photo, extract the EXIF information and gain access to the hidden admin interface. Keywords for this challenge are: Tricky, Exif, Blackbox. The basic principles of Path Traversal. Explained in detail by instruction video, corresponding challenge and Path Traversal cheat sheet.
1x
1x
1x
Order€ 9,95
The Path Traversal instruction package consists of three parts. The instruction video Path Traversal, the challenge "Herman Vluchtbeveiliging" and the Path Traversal cheat sheet. The instruction video discusses the basic principles of Path Traversal, using the Herman Vluchtbeveiliging challenge. This Challenge is also part of the package. The Path Traversal cheat sheet contains a useful overview of Path Traversal applications.
Package Contents:
This instruction video explains the basic principles of Path Traversal. In the video the challenge "Herman Vluchtbeveiliging" is used for demonstration purposes. Herman may be a security specialist, his website is not secure at all! Obtain the content of the /etc/passwd file to illustrate this. This cheat sheet presents an overview of Path Traversal applications and provides some useful tips. The basic principles of SQL Injection explained in detail. Invaluable information for the Essential Security Certification.
1x
1x
1x
Order€ 9,95
The instruction package SQL Injection consists of three parts. The instruction video SQL Injection, the corresponding Security Shop challenge and the SQL Injection cheat sheet. The instruction video discusses the basic principles of SQL and SQL injection thoroughly. The Security Shop challenge is a fun challenge that enables you to practice your new skills immediately. The cheat sheet offers a useful overview of SQL Injection applications.
Package Contents:
This instruction video explains the basic principles of SQL and SQL Injection. After watching this video you should be able to perform basic SQL Injections without difficulty. The fictitious Security Shop website offers a number of interesting products. Unfortunately they didn't pay too much attention to the security of their own website. You complete this challenge by reading the admin password from the database. This cheatsheet presents an overview of SQL Injection applications and provides some useful tips. Practice makes perfect! Extra challenges for the Essential Security certification. Polish your SQL and Path Traversal skills with these challenges.
3x
Order€ 12,99
Practice makes perfect! This bootcamp pack consists of 3 extra Essential Security challenges. Ideal for everybody who wants to practice their SQL Injection and Path Traversal skills.
Package Contents:
The treasure challenge is your guide to all must-have treasures. You complete this challenge if you are able to gain access to the admin interface and add you own treasure to the map. This Premium Challenge invites you to gain access to the members only section of the Hacker Comedy and Tragedy club. There are a total of 7 different (SQL Injection or Path Traversal) vulnerabilities in the Hackblog Challenge. Find them all to score a whopping 100% for this challenge! The basics of Cross Site Scripting on a platter. Contains instruction video with challenge and the XSS cheat sheet. Get certified now!
1x
1x
1x
Order€ 9,95
The instruction pack Cross Site Scripting consists of three parts. The instruction video Cross Site Scripting, the My Password challenge and the XSS cheat sheet. The instruction video discusses the basic principles of Cross Site Scripting. The My Password challenge is a fun challenge that allows you to practice your new skills immediately. The cheat sheet offers a useful overview of XSS applications. Essential when completing the Security Specialist certificate.
Package Contents:
This instruction video explains the basic principles of Cross Site Scripting. After watching this video you should be able to successfully complete the Cross Site Scripting challenges. This new version of the My Password challenge is based on the Portable Password vault. Gain access to the vault to score 100% for this challenge! This cheat sheet presents an overview of Cross Site Scripting applications and provides some useful tips. An outline of Port and Version Scanning by the means of video and challenge. Brings you one step closer to the Security Specialist Certification.
1x
1x
Order€ 9,95
This package consists of the instruction video Port Scanning and the challenge Find My Ports. The instruction video discusses the basic principles of port and version scanning. The Find My Ports challenge enables you to practice your new skills immediately.
Package Contents:
This instruction video explains the basic principles of port and version scanning. After watching this video you should be able to perform basic port and version scans without difficulty. Find and identify services on three different IP addresses. You complete this challenge by identifying five services correctly. Extra challenges for the Security Specialist Certification. Keywords: Port and Version Scanning, Header Manipulation, Path Traversal, SQL Injection.
4x
Order€ 12,99
This bootcamp pack consists of four extra Security Specialist challenges. Ranging from Port and Version scanning to SQL Injection and HTTP Header Manipulation. Practice your skills until perfection.
Package Contents:
The Breakfast Club is famous for the Hacker's Breakfast! Your task is simple, uncover the secret recipe and score 100% for this challenge (and a great breakfast)! The P2000 website shows emergency calls for police, fire department and ambulance.
You complete the challenge by getting access to the members-only section. You can only access the Secret Spy website by the means of special HTTP headers. Gain access and complete the challenge! This is an easy one! Find all open TCP ports and execute the "/secret" command on the remote server to score 100% for this challenge. The basics of Cross Site Request Forgery in one package. The pack contains an instruction video and the related Avatar challenge. Get certified now!
1x
1x
Order€ 9,95
The Cross Site Request Forgery package consists of two parts: the
instruction video Cross Site Scripting and the Avatar Challenge. The instruction
video discusses the basic principles of Cross Site Request Forgery, using the included Avatar challenge. Essential for completing the Web Security Specialist certificate.
Package Contents:
This instruction video demonstrates Cross Site Request Forgery, also known as XSRF, using a Certified Secure challenge. In this new version of the Avatar challenge you can create your own virtual avatar! Use Cross Site Request Forgery to make people automatically vote for your avatar. You score 100% when your avatar has at least ten votes. Everything about Command Injection and Malicious Uploads. Essential for completing the Web Security Specialist Certification.
2x
1x
Order€ 9,95
The instruction package Command Injection consists of the instruction video Web Insecurity and two different training challenges. Essential when completing the Web Security Specialist Certification.
Package Contents:
This instruction video discusses two security problems on websites: Command Injection and uploading files. The Trace application executes a trace route on an IP address. Compromise the server and execute the command 'victory' to complete the challenge. On the Bachelor website you can upload a picture and profile. Compromise the site and execute the command 'victory' to complete the challenge. Extra extra! Extra challenges for the Web Security Specialist Certification. Practice your skills using these unique challenges.
4x
Order€ 12,99
This bootcamp pack consists of four extra Web Security Specialist challenges. Perfect if you want to practice your authentication and authorization bypass skills to the max.
Package Contents:
Honest Achmed is a very secure Certificate Authority. Obtain the verification code, bypass the authentication and create an SSL certificate to score 100% for this challenge! There are five chess boards active in this challenge. Three boards are protected by a password. You complete the challenge if you make a move on these boards. This Tetris Challenge is secured by a password. Bypass the authentication and score 100.000 points to complete the challenge. Sharing is caring! This new online paste tool is built on OpenStack. Recover the OpenStack password to score 100% for this challenge! This pack is loaded with Forensic Specialist video's and challenges. It contains no less than 4 video's and four Forensic Analysis challenges. Get certified now!
4x
4x
Order€ 14,95
The instruction package Forensic Specialist consists of the following instruction video's: Analyze Network traffic, Analyze Hard disk, Copy Hard disk and Capturing Network traffic. Four exciting training challenges are also included. Everything you need to complete the Forensic Specialist Certification.
Package Contents:
This instruction video demonstrates how to analyze network traffic. This instruction video demonstrates how to analyze a hard disk. This instruction video demonstrates how to make a forensic copy of a hard disk. This instruction video demonstrates how to capture network traffic. A true forensic expert is capable of identifying the owner and location of any IP address. Check the WHOIS information to find out who is the owner of the IP address and also where he or she is located. Find the owner of five different IP addresses and score 100% on this challenge. Maarten's Security Shop was compromised. Analyze the hard disk to find out which attacks were executed.
Calculate multiple hashes. You complete this challenge when you are able to calculate MD5, SHA1, SHA256 and SHA512 hashes. Analyze three pcap files using Wireshark.
Subsequently you have to answer a number of questions about the attacks that were executed. Trending topic in this package: server security. Everything you need for the Server Security Specialist Certificate.
5x
2x
1x
Order€ 14,95
The instruction package Server Security Specialist consists of the instruction video UDP Port Scanning, the instruction video Server Insecurity, a cheat sheet and five different training challenges. Simply everything you need for the Server Security Specialist certification.
Package Contents:
This instruction video shows how UDP Port Scanning works and also discusses the difference from TCP. This instruction video discusses three security issues for servers: mail, FTP and passwords. The fictional company Fasttrack has installed a new project management system. Log in as admin to complete the challenge. Find and identify UDP services on an IP address. You complete this challenge by identifying all services correctly, should be really easy! Use the Hydra Tool to retrieve Barbara's password. The mail server in this challenge has a configuration problem. Demonstrate this problem by using the mail server as open relay. To complete this challenge you have to upload a file using anonymous FTP. List of frequently used passwords. Everything you need to know about Input Validation and Authentication. A must-have when working on the Security Aware Programmer Certification.
4x
2x
Order€ 14,95
The instruction package Security Aware Programmer consists of the instruction video Input Validation, the instruction video Authentication and four different training challenges. A real must-have when working on the Security Aware Programmer Certification.
Package Contents:
This instruction video illustrates how user input can be validated before it is used in SQL queries, file names or HTML. In this instruction video the storage of passwords by using hashing, salts and stretching is discussed. With the use of an editor you have to edit PHP code that contains many SQL Injections.
By clicking the 'SECURITY TEST' button the system checks if the problems are solved. You complete the challenge if all problems are solved. With the use of an editor you have to edit PHP code that contains Path Traversal.
By clicking the 'SECURITY TEST' button the system checks if the problems are solved. You complete the challenge if all problems are solved. With the use of an editor you have to edit some PHP code that contains Cross Site Scripting.
By clicking the 'SECURITY TEST' button the system checks if the problems are solved. You complete the challenge if all problems are solved. This vault application needs some authentication. Build it to secure the vault. An automated test checks if the authentication is valid and determines if the challenge is completed. Everything there is to know about Firewalling and Software Updating. For those who are working on the Security Aware Administrator Certificate.
4x
2x
2x
Order€ 14,95
The pack consists of two
instruction video's: Firewalling and Updates, two cheat
sheets and four different exciting training challenges. Essential when completing the Security Aware Administrator Certification.
Package Contents:
This instruction video demonstrates how to configure a firewall. Some useful tips are included. This instruction video discusses the importance of software updates and shows how to verify them. In this challenge you use the special
'Firewall builder' tool to design a basic firewall for use at home. When the firewall meets the requirements you complete the challenge. A set of firewall rules is presented to you. Al you have to do is put them in the right order. You complete the challenge if the rules are in the right order and the firewall works. A customer wants you to design a more advanced firewall for his network. You complete the challenge if the advanced firewall meets the requirements. If you have good understanding of iptables you should be able to complete this challenge successfully without difficulty. In this cheat sheet you will find an overview of the most common services and ports on the internet. In this cheat sheet you will find an overview of the most important iptables options and commands.