Threat Hunt with PowerShell

Threat Hunt with PowerShell

When performing threat hunting exercises, as a security professional, there needs to be a method to the madness in order to ensure constant improvements are being made to your security stance. In this course, Threat Hunt with PowerShell, you’ll learn to apply MITRE TTPs in a real-world setting with PowerShell. Read more…

Pen Testing with Bash

Pen Testing with Bash

Bash is a widely-used and highly regarded tool for shell scripting and command line interface operations. It is known for its versatility, robustness, and standardization across Unix-like operating systems. In this course, Pen Testing with Bash, you’ll learn to utilize this powerful tool for pen testing. First, you’ll explore reconnaissance Read more…

Threat Hunting with Wireshark for SecOps

Threat Hunting with Wireshark for SecOps

The field of cybersecurity has grown tremendously in the past few years. With every new breach, we realize just how important analysis skills have become in identifying, mitigating, and protecting networks. Wireshark is one of the most important tools in the toolbox for identifying threats, spotting unusual behavior, and analyzing Read more…

Scan Web Applications with Bash

Scan Web Applications with Bash

During a web application pen test, your first step is to enumerate the target application to find vulnerabilities that could later be exploited. In this course, Scan Web Applications with Bash, you’ll learn how to write bash scripts to discover content in web applications as well as finding vulnerabilities in Read more…

Ethical Hacking Recon and the Dark Web

Ethical Hacking Recon and the Dark Web

This live and interactive training is designed to help you perform passive and active reconnaissance in ethical hacking and bug bounty hunting engagements. You will learn intermediate-to-advanced recon methodologies using open source intelligence (OSINT). In this training you will also learn how to perform dark web research and reconnaissance. You Read more…