دسته: دوره ها

Malware Development for Ethical Hackers & Pentesters is designed for cybersecurity professionals aiming to deepen their understanding of malware creation and analysis within ethical boundaries. It provides hands-on experience in developing and dissecting malware to enhance penetration testing and red teaming skills.

ادامه مطلب

Offensive API Exploitation course by Vikash Chaudhary is an advanced, hands-on training program designed for cybersecurity professionals aiming to master the art of attacking and securing APIs. Master API Hacking with Real-World Exploits: BOLA, SSRF, Auth Bypass & API Bug Bounty Techniques

ادامه مطلب

Generative AI for Cybersecurity Experts is tailored for cybersecurity professionals aiming to integrate generative AI technologies into their security practices. It offers a comprehensive overview of how tools like large language models (LLMs) and diffusion models can be applied to enhance threat detection, prevention, and response strategies.

ادامه مطلب

Cloud Red Team : Attacking and Defending Azure is designed to help security professionals in understand, analyze and practice attacks in an enterprise-like live Azure environment that has effective security controls in place. You will be able to practice and sharpen popular tactics, techniques and procedures (TTPs) for Azure environments. In addition, you will learn how to bypass security controls like Advanced Conditional Access Policies, Multiple ways to bypass MFA that is enforced using different methods, Privileged Identity Management (PIM) and Microsoft Defender for Cloud. CARTE also focuses on abuse of JWT signing, Family of Client IDs (FOCI), Attribute Based Access Control (ABAC), Temporary Access Password (TAP), Custom Claims, Cross Tenant Access, Azure Lighthouse, Azure ARC, Multi-Cloud Access, Tokens form Office Applications and traffic and Abuse of Kerberos in Entra ID.

ادامه مطلب

Assembly 101 will teach you how computers work down to the lowest level and how to write and read the human readable version of the 1s and 0s they speak in – Assembly. The course starts with an introduction on how computers perform computations using transistors, logic gates and machine code (1s and 0s), then moves on to writing your own assembly programs. Students will start writing x86-16 assembly in a beginner-friendly 8086 emulator to learn the fundamentals and then move on to writing modern x86-64 assembly.

ادامه مطلب

SEC670 dives deep into the art of Red Team operations, focusing on the development of custom tools for Windows environments. Participants will learn how to craft stealthy, highly effective tools to bypass modern defenses, evade detection, and simulate real-world adversary techniques. Through hands-on labs and expert-led instruction, students will explore low-level programming, process injection, API hooking, and more. Ideal for penetration testers, Red Teamers, and security researchers, this course equips professionals with the skills to create undetectable attack frameworks, ensuring they stay ahead in the evolving cybersecurity landscape.

ادامه مطلب