Scan Web Applications with Bash

Scan Web Applications with Bash

During a web application pen test, your first step is to enumerate the target application to find vulnerabilities that could later be exploited. In this course, Scan Web Applications with Bash, you’ll learn how to write bash scripts to discover content in web applications as well as finding vulnerabilities in Read more…

Ethical Hacking Recon and the Dark Web

Ethical Hacking Recon and the Dark Web

This live and interactive training is designed to help you perform passive and active reconnaissance in ethical hacking and bug bounty hunting engagements. You will learn intermediate-to-advanced recon methodologies using open source intelligence (OSINT). In this training you will also learn how to perform dark web research and reconnaissance. You Read more…

Learn OSINT from Scratch

Learn OSINT from Scratch

OSINT, or Open-Source Intelligence, refers to the collection, analysis, and dissemination of information that is publicly available on the internet. It involves using a variety of tools and techniques to gather and analyze data from different sources, with the aim of gaining insights and intelligence that can be used to Read more…

Mastering Digital Forensics with FTK Imager

Mastering Digital Forensics with FTK Imager

This course, Mastering Digital Forensics with FTK Imager, will guide users through the features and processes necessary to use FTK Imager. Digital forensics is an essential aspect of modern-day forensic investigations, law enforcement, information security, and IT professionals. As more and more information is stored and transmitted digitally, the need to Read more…

Specialized DFIR: Windows Registry Forensics

Specialized DFIR: Windows Registry Forensics

The Windows registry is a key source of information during any forensic investigation, but registry artifacts are often misunderstood. In this course, Specialized DFIR: Windows Registry Forensics, you’ll learn how to properly analyze the Windows registry to discover signs of malicious activity. First, you’ll explore where registry hives are located Read more…

Ethical Hacking: Sniffers

Ethical hacking involves testing to see if an organization’s network is vulnerable to outside attacks. It’s one of the most desired stills for any IT security professional. In this course—which maps to the Certified Ethical Hacker v12 certification—Lisa Bock provides an overview of what a sniffer is, and how hackers Read more…