Assembly 101 will teach you how computers work down to the lowest level and how to write and read the human readable version of the 1s and 0s they speak in – Assembly. The course starts with an introduction on how computers perform computations using transistors, logic gates and machine code (1s and 0s), then moves on to writing your own assembly programs. Students will start writing x86-16 assembly in a beginner-friendly 8086 emulator to learn the fundamentals and then move on to writing modern x86-64 assembly.

ادامه مطلب

FOR608 is an advanced course designed for cybersecurity professionals responsible for detecting, responding to, and mitigating sophisticated cyber threats within enterprise environments. The course emphasizes proactive threat hunting, effective incident response strategies, and the use of cutting-edge tools and techniques to combat advanced persistent threats (APTs) and complex attacks.

ادامه مطلب

Evasion Techniques and Breaching Defenses (PEN-300) is an advanced penetration testing course. Learners who complete the course and pass the exam will earn the OffSec Experienced Pentester (OSEP) certification. This course builds on the knowledge and techniques taught in Penetration Testing with Kali Linux, teaching learners to perform advanced penetration tests against mature organizations with an established security function and focuses on bypassing security mechanisms that are designed to block attacks. The OSEP is one of three certifications making up the OSCE certification along with the OSWE for advanced web attacks and OSED for exploit development.

ادامه مطلب

SEC670 dives deep into the art of Red Team operations, focusing on the development of custom tools for Windows environments. Participants will learn how to craft stealthy, highly effective tools to bypass modern defenses, evade detection, and simulate real-world adversary techniques. Through hands-on labs and expert-led instruction, students will explore low-level programming, process injection, API hooking, and more. Ideal for penetration testers, Red Teamers, and security researchers, this course equips professionals with the skills to create undetectable attack frameworks, ensuring they stay ahead in the evolving cybersecurity landscape.

ادامه مطلب

DevOps has revolutionised the traditional software delivery lifecycle resulting in faster product delivery, faster issue resolution, greater scalability, and more automation. Throughout this course, you will learn how DevOps practices can bring similar benefits to your penetration testing and red team operations.

ادامه مطلب

The AI Red Teamer Job Role Path, in collaboration with Google, trains cybersecurity professionals to assess, exploit, and secure AI systems. Covering prompt injection, model privacy attacks, adversarial AI, supply chain risks, and deployment threats, it combines theory with hands-on exercises. Aligned with Google’s Secure AI Framework (SAIF), it ensures relevance to real-world AI security challenges. Learners will gain skills to manipulate model behaviors, develop AI-specific red teaming strategies, and perform offensive security testing against AI-driven applications. The path will be gradually expanded with related modules until its completion.

ادامه مطلب

Threat Hunting in Microsoft Sentinel and Defender course by MalTrak is designed to equip cybersecurity professionals with the skills to detect and respond to advanced threats using Microsoft’s security tools. This training emphasizes practical, hands-on experience in leveraging Microsoft Sentinel and Defender for effective threat hunting and incident response.

ادامه مطلب

This course provides a beginner-level introduction to the tools and methodologies used to perform malware analysis on executables found in Windows systems using a practical, virtual hands-on approach. The course introduces students to Disassembly, including subtopics on x86 Architecture, The Stack, C Code Constructs, and an introduction to IDA Pro. The content is developed and taught by FLARE malware analysts who are experienced in analyzing a diverse set of malware.

ادامه مطلب