دسته: موسسه های دیگر

Participants will learn how to exploit Common Vulnerabilities and Exposures (CVEs) in web applications to earn bug bounties. The course provides practical insights into identifying and leveraging CVEs in bug bounty programs.

ادامه مطلب
Recon for Bug Bounties course covers the reconnaissance phase of bug bounty hunting and penetration testing, teaching participants how to gather crucial information about a target to identify vulnerabilities and attack vectors.

ادامه مطلب

Top 5 Tools & Techniques for Penetration Testing course introduces the top five tools for penetration testing and bug bounties, providing practical knowledge for the information security industry. Participants will learn how to effectively use these tools in real-world scenarios.

ادامه مطلب

Blitzscaling Security: Diary of a Security Engineer by Sparc Flow chronicles the journey of Alex, the inaugural security engineer at a rapidly growing startup. The narrative delves into Alex’s experiences, from the interview process to the initial months of establishing security protocols. It highlights interactions with various teams, communication challenges, vulnerability prioritization, and the tension between conventional security wisdom and practical application. The book emphasizes pragmatism and first principles, aiming to debunk prevalent myths in the security field that may be counterproductive.

ادامه مطلب

The Active Directory Penetration Tester Job Role Path is designed for individuals who aim to develop skills in pentesting large Active Directory (AD) networks and the components commonly found in such environments. This path equips students with the skills needed to evaluate the security of AD environments, navigate complex Windows networks, and identify elusive attack paths. This path includes advanced hands-on labs where participants will practice techniques such as Kerberos attacks, NTLM relay attacks, and the abuse of services like AD Certificate Services (ADCS), Exchange, WSUS, and MSSQL. Students will also learn how to exploit misconfigurations in Active Directory DACLs and Domain Trusts, perform evasion tactics in Windows environments, and leverage Command and Control (C2) frameworks for post-exploitation activities. By combining theoretical foundations with practical exercises and a structured methodology for identifying AD vulnerabilities, this path enables students to conduct professional security assessments on complex AD infrastructures and effectively report security weaknesses discovered by chaining multiple vulnerabilities.

ادامه مطلب

The SOC Analyst Job Role Path is for newcomers to information security who aspire to become professional SOC analysts. This path covers core security monitoring and security analysis concepts and provides a deep understanding of the specialized tools, attack tactics, and methodology used by adversaries. Armed with the necessary theoretical background and multiple practical exercises, students will go through all security analysis stages, from traffic analysis and SIEM monitoring to DFIR activities and reporting. Upon completing this job role path, you will have obtained the practical skills and mindset necessary to monitor enterprise-level infrastructure and detect intrusions at an intermediate level. The SOC Analyst Prerequisites skill path can be considered prerequisite knowledge to be successful while working through this job role path.

ادامه مطلب