دسته: TCM Security

This course focuses on external penetration testing tactics and techniques designed to help you improve your pentest game. Students should take this course if they are interested in:

  • Gaining a better understanding of the external pentest attack methodology and mindset
  • Improving overall pentest skillset and client relations
  • Crushing their next pentest job interview
ادامه مطلب

Welcome to C# 101 for Hackers. This course introduces students to C# and the .NET framework. Students will learn to install and configure C# and .NET for development and concentrate on learning the language by writing C# console applications. Topics covered include the basic structure and syntax of C#, an introduction to the many core and fundamental statements and practices within C#, and leverage what’s discussed with examples that students can implement, re-use, and learn from further.

ادامه مطلب

The Beginner’s Guide to IoT and Hardware Hacking course teaches foundational skills and techniques required to get started performing security research and testing on IoT devices and hardware. This course focuses mainly on the hardware aspects of IoT hacking and how to use the underlying access to physical hardware to aid in and amplify the ability to hunt for vulnerabilities. While this course is a “beginners” level for IoT and Hardware Hacking the difficulty level as an overall cybersecurity course is intermediate. This course is open to everyone but has been specifically created for students who are familiar with software-based penetration testing (such as network, web and mobile) and want to learn how to bridge those skills over to IoT and Hardware testing.

ادامه مطلب

Arm yourself with knowledge and bring the fight to the bad guys! Practical Malware Analysis & Triage (PMAT) brings the state of the art of malware analysis to you in engaging instructional videos and custom-made, practical labs.

Welcome to Practical Malware Analysis & Triage. I’m Matt, aka HuskyHacks, and I’m excited to be your instructor for this course. I had a blast putting it together and I hope that you will come along with me and learn the art of splicing, slicing, inspecting, and dissecting malware samples.

ادامه مطلب

This course aims to equip students with all of the fundamental security operations knowledge and practical skills needed in order to achieve and excel in a T1 or T2 SOC Analyst position. By covering topics such as phishing analysis, incident response procedures, threat detection techniques, log analysis, SIEM management, and security tool utilization, students will gain the essential competencies required to effectively monitor, analyze, and respond to security incidents within a SOC environment.

Students will be able to actively engage with the course material through bite-sized video demonstrations, written materials and references, quizzes to assess comprehension, and practical exercises that simulate real-world scenarios.

ادامه مطلب