BENEFITS
Best Seller
Online Courses
24/7 Support
Lifetime Access
Get Certificate
Offer Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 002 Scanning with ZENMAP (13:07)
- 001 Initial Reconnaissance with OSINT Framework (17:25)
- 003 Scanning with NMAP in Command Line & in Python (25:28)
- 004 Scanning with Metasploit AUX & CENSYS (14:41)
- 005 Metasploitable Environment Preparation (8:29)
- 006 Enum with NMAP Part 1 (20:29)
- 007 Enum with NMAP Part 2 (14:15)
- 008 Enum with Metasploit and other tools (16:22)
Available in
days
days
after you enroll
- 002 Setting up OpenVAS-GVM (9:31)
- 001 Introduction to Vulnerability Scanning and Analysis (13:35)
- 003 Vulnerability Assessment with OpenVAS-GVM (16:01)
- 004 Vulnerability Analysis in Action (27:23)
- 005 Second Opinion Vulnerability Scanning with NMAP NSE Scripts (21:30)
- 006 Third Opinion Vulnerability Scanning with Metasploit (12:07)
Available in
days
days
after you enroll
- 002 Metasploitable2 - Part 1 (13:14)
- 001 Initial Presentation (18:18)
- 003 Metasploitable2 - Part 2 (11:49)
- 004 Metasploitable2 - Part 3 (17:02)
- 005 Metasploitable2 - Part 4 (17:12)
- 006 Metasploitable3 Ubuntu - Part 1 (18:30)
- 007 Metasploitable3 Ubuntu - Part 2 (17:10)
- 008 Metasploitable3 Ubuntu - Part 3 (16:08)
- 009 Metasploitable3 Ubuntu - Part 4 (13:19)
- 010 Metasploitable3 Win2k8 - Part 1 (13:22)
- 011 Metasploitable3 Win2k8 - Part 2 (15:50)
- 012 Metasploitable3 Win2k8 - Part 3 (16:18)
- 013 Password Hash Crack - Part 1 (15:42)
- 014 Password Hash Crack - Part 2 (19:23)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 002 Social Engineering Concepts - Part 2 (11:25)
- 001 Social Engineering Concepts - Part 1 (10:10)
- 003 Gophish Framework - Reaching the Target - Part 1 (17:05)
- 004 Gophish Framework - Reaching the Target - Part 2 (13:13)
- 005 Social Engineering Client Side Attacks - Part 1 (11:31)
- 006 Social Engineering Client Side Attacks - Part 2 (10:52)
Available in
days
days
after you enroll
- 001 Web App Pentesting Concepts - Part 1 (17:50)
- 002 Web App Pentesting Concepts - Part 2 (12:49)
- 003 Web App Pentesting Concepts - Part 3 (15:48)
- 004 Web App Pentesting Concepts - Part 4 (11:29)
- 005 Burp Suite Basics - Part 1 (19:49)
- 006 Burp Suite Basics - Part 2 (16:55)
- 007 Damn Vulnerable Web Application Lab - Part 1 (15:40)
- 008 Damn Vulnerable Web Application Lab - Part 2 (20:41)
- 009 Damn Vulnerable Web Application Lab - Part 3 (23:51)
- 010 Damn Vulnerable Web Application Lab - Part 4 (20:36)
- 011 Damn Vulnerable Web Application Lab - Part 5 (10:32)
- 012 OWASP Webgoat Lab - Part 1 (9:56)
- 013 OWASP Webgoat Lab - Part 2 (14:22)
- 014 OWASP Mutillidae II Lab - Part 1 (23:09)
- 015 OWASP Mutillidae II Lab - Part 2 (21:48)
- 016 Metasploitable 3 Vulnerable Web App (9:07)
- 017 bWAPP - Buggy Web Application Lab (13:43)
- 018 PortSwigger - Online Vulnerable Web Apps - Part 1 (16:16)
- 019 PortSwigger - Online Vulnerable Web Apps - Part 2 (12:38)
Available in
days
days
after you enroll
- 001 Basics 1_ Installation & Config , Basic Operations, Binary Operations (17:18)
- 002 Basics 2_ Loop Statements, Flow Control and Modules (17:34)
- 003 Basics 3_ Data Types and Functions (18:39)
- 004 Classes and Objects, Mini Project I_ Writing a Port Scanner (21:06)
- 005 Mini Project II_ Writing a Malware Command & Control (C&C) Server_Client (18:41)
Available in
days
days
after you enroll
- 002 Easy 1 - BLUE (Enumeration, Exploitation, Hash Dump and Impacket Framework) (20:07)
- 001 Intro to Hack the Box (HTB) CTF (7:38)
- 003 Easy 2 - DEVEL (Indirect Web Shell Upload, Local Exploit Suggester, Priv. Esc.) (14:40)
- 004 Easy 3 - NETMON (PRTG Exploit with Python, Creds Discovery & Guessing) - Part 1 (18:45)
- 005 Easy 3 - NETMON (PRTG Manual Exploit with Nishang Reverse Shells) - Part 2 (16:06)
- 006 Medium 1 - POPCORN (Dirbuster Enum, Upload Abuse, Nix PAM, DirtyCow Exploit) (21:43)
- 007 Medium 2 - BLUNDER (Gobuster, Bludit CMS exploits) - Part 1 (18:23)
- 008 Medium 2 - BLUNDER (Hashcat, LinPEAS Priv Esc., sudo Exploit) - Part 2 (16:32)
- 009 Medium 2 - BLUNDER (CSRF_Anti-Bruteforce Bypass with Python Scripting) - Part 3 (16:21)
- 010 Medium 3 - SNIPER (SMB Enum, LFI RFI, Gain Rev Shell) - Part 1 (18:30)
- 011 Medium 3 - SNIPER (RFI RCE, Local Enum, Priv Esc, CHM Weaponization) - Part 2 (17:18)
- 012 Medium 3 - SNIPER (CrackMapExec, Impacket, Cookie Poisoning) - Part 3 (19:16)
- 013 Medium 4 - MANGO (Recon, NoSQL MongoDB Injection) - Part 1 (18:40)
- 014 Medium 4 - MANGO (Write NoSQL Injector with Python) - Part 2 (16:03)
- 015 Medium 4 - MANGO (Write NoSQL Injector with Python) - Part 3 (20:43)
- 016 Medium 4 - MANGO (LinPEAS, GTFOBins Priv. Esc. Attack Vectors) - Part 4 (13:15)
- 017 Hard 1 - CONTROL (Manual SQL Injection, SQLmap) - Part 1 (19:18)
- 018 Hard 1 - CONTROL (Read & Write Webshells with SQLMap, winPEAS) - Part 2 (20:08)
- 019 Hard 1 - CONTROL (Windows Priv. Esc Abusing SDDL Perms, Service Exec) - Part 3 (20:16)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 002 Introduction to Red Teaming - Part 2 (20:03)
- 001 Introduction to Red Teaming - Part 1 (19:12)
- 003 Red Teaming Operations - Part 1 (18:46)
- 004 Red Teaming Operations - Part 2 (21:50)
- 005 Red Teaming Infrastructure - Part 1 (16:15)
- 006 Red Teaming Infrastructure - Part 2 (12:01)
- 007 Red Teaming Infrastructure - Part 3 (11:15)
- 008 Red Teaming Command and Control (C&C) - Part 1 (18:54)
- 009 Red Teaming Command and Control (C&C) - Part 2 (18:43)
- 010 Red Teaming Command and Control (C&C) - Part 3 (18:06)
- 011 Red Teaming Command and Control (C&C) - Part 4 (17:57)
- 012 Red Teaming Command and Control (C&C) - Part 5 (22:17)
- 013 Red Teaming Weaponization (DDE & Micro Attacks) - Part 1 (16:12)
- 014 Red Teaming Weaponization (HTA Attack, Droppers, File Format Exploits) - Part 2 (10:44)
- 015 Red Teaming Initial Access Attack Scenarios (12:53)
- 016 Red Teaming Post Exploit (Proc Injection & Bypass UAC, Token Tampering) - Part 1 (16:10)
- 017 Red Teaming Post Exploit (Keylogger, Screen Spy, Cobalt Strike Ops) - Part 2 (15:59)
- 018 Red Teaming Post Exploit (Pivoting, Session Passing, RDP Tunnel) - Part 3 (12:26)
Available in
days
days
after you enroll
- 001 Active Directory Attacks Concepts - Part 1 (19:17)
- 002 Active Directory Attacks Concepts - Part 2 (16:42)
- 003 Active Directory Attacks Concepts - Part 3 (18:08)
- 004 Active Directory Setup on Metasploitable VM (18:36)
- 005 Vulnerable AD Lab Preparation (17:16)
- 006 AD Enumeration, Credentials Replay Attacks, Over-PTH, Secretsdump and Evil-WinRM (17:35)
- 007 AS-REP Roast, Hashcat, Pass The Ticket Attacks (21:37)
- 008 Golden Tickets, Kerberoasting against User SPNs and Mimikatz Attacks (19:39)
Available in
days
days
after you enroll
- 002 Introduction to MITRE ATT&CK - Part 2 (12:23)
- 001 Introduction to MITRE ATT&CK - Part 1 (13:31)
- 003 Reconnaissance (8:40)
- 004 Resource Development (6:29)
- 005 Initial Access (11:35)
- 006 Execution (5:43)
- 007 Persistence (9:35)
- 008 Privilege Escalation (6:50)
- 009 Defense Evasion (14:50)
- 010 Credential Access (8:03)
- 011 Discovery (7:57)
- 012 Lateral Movement (4:07)
- 013 Collection (5:17)
- 014 Command and Control (7:15)
- 015 Exfiltration (4:09)
- 016 Impact (7:09)
Available in
days
days
after you enroll
- 001 SIEM vs. SOC (5:55)
- 002 How SIEM works (4:25)
- 003 What are SIEM Use-Cases and Common Mistakes_ (8:24)
- 004 Threat Intelligence & OSSIM Open Threat Exchange (OTX) P1 (9:00)
- 005 Threat Intelligence & OSSIM Open Threat Exchange (OTX) P2 (5:43)
- 006 SIEM vs. SOAR vs. UEBA (4:12)
- 007 How secure is secure enough_ (3:56)
- 008 Defense-in-Depth Architecture Part 1 (6:38)
- 009 Defense-in-Depth Architecture Part 2 (6:00)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 001 Integrating Windows Endpoint in Wazuh Manager (4:53)
- 002 Automated Roll-out of Wazuh Agent on a Network of Windows Workstations (16:40)
- 003 Integrating Linux Endpoint in Wazuh Manager (3:58)
- 004 Integrating Fortigate Firewall in Wazuh Manager (13:02)
- 005 Changing Password of the Read-Only Admin Account (7:32)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 002 Linux System Calls Monitoring_ Alert when Auditctl Rules are met (7:05)
- 001 File Integrity Monitoring (FIM)_ Alert when Critical Files Touched (11:21)
- 003 Continuous Enterprise Vulnerability Monitoring (11:51)
- 004 CIS Hardening Monitoring with Wazuh SCA (Less is More Principle) (9:20)
- 005 Windows Defender in Wazuh_ Centrally Monitor Malware & Actions across Endpoints (6:18)
- 006 Use Sysinternals Sysmon with Wazuh_ The Swiss Army Knife for Windows Monitoring (9:34)
Offer Ending Soon