Bug Bounty Recon

Bug Bounty Recon

Many new bug bounty hunters struggle with effective reconnaissance, which is the foundation for finding vulnerabilities. In this course, Bug Bounty Recon, you’ll learn techniques for bug bounty recon. First, you’ll evaluate bug bounty scopes, manually inspect targets, and perform subdomain and service enumeration. Next, you’ll use OWASP ZAP for Read more…

Network Forensics

Network Forensics

Network forensics is used to find legal evidence in network devices. This course covers all the major concepts and tools of this growing (and exciting) technical field. Instructor Jungwoo Ryoo reviews the basics: the goals of network forensics, the types of investigations it’s used for, a network forensic investigator’s typical Read more…

Wi-Fi Self Defense for Beginners

Wi-Fi Self Defense for Beginners

We use Wi-Fi connected devices every day of our lives, from our phones, laptops, smart TVs, home security cameras, and anything else you can think of. Yet, while technology helps improve our lives by keeping everything connected to the world around us, those connections inherently have vulnerabilities, and there are Read more…

Advanced Windows Priviledge Escalation For OSCP & Beyond!

Advanced Windows Priviledge Escalation For OSCP & Beyond!

This advanced course is designed for experienced penetration testers, red teamers, and security professionals seeking to master the art of privilege escalation within Windows environments. As attackers increasingly target Windows systems, understanding the intricate mechanisms that enable privilege escalation is essential for both offensive and defensive security operations. Throughout this Read more…