دسته: دوره ها

The Evasion lab (Certified Evasion Techniques Professional) is designed to equip information security professionals with the expertise needed to bypass defenses in modern enterprise environments. This course delves deep into the techniques and methodologies used to bypass endpoint countermeasures like EDRs. You will gain a comprehensive understanding of Windows internals, including the distinction between user-mode and kernel-mode components, also you will gain a comprehensive understanding of EDRs internals, and how telemetries are collected.

​Throughout the course, you will learn about Windows Internals, reversing EDRs, bypassing  Microsoft Defender for Endpoint (MDE), Elastic EDR, Sysmon weaponizing kernel exploits for defense evasion and bypassing security controls like Protected Processes (PP), Process Protection Light (PPL), Digital Signature Enforcement (DSE), Attack Surface Reduction (ASR) rules and incapacitating Event Tracing for Windows (ETW) telemetry and a lot more .

ادامه مطلب

The course includes hands on demonstrations using both Cumulus VX and physical switches. The best part is you can practice using GNS3 and Cumulus VX locally on your laptop. Cumulus Linux combines the power of Open Networking with a network operating system that runs on top of industry standard networking hardware from vendors such as Dell, HP, Quanta and others. Founded by veteran networking engineers from Cisco and VMware, Cumulus Networks makes the first Linux operating system for networking hardware and fills a critical gap in realizing the true promise of the software-defined data center. Just as Linux completely transformed the economics and innovation on the server side of the data center, Cumulus Linux is doing the same for the network. It is radically reducing the costs and complexities of operating modern data center networks for service providers and businesses of all sizes.

ادامه مطلب

Learn how to hack web applications, automate your exploits in python and defend web applications against real world attacks! For each vulnerability type, we dive into the technical details and then gain hands-on experience by solving labs that model real-world vulnerabilities.

ادامه مطلب

Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video Course is your complete study toolkit to get exam ready for the RHCSA RHEL 9 exam. This course is also a great resource for anyone who wants to enhance their Linux skills to grow their career. Expert trainer and author Sander van Vugt provides topic-focused coverage of all objectives in the exam, drilling down on important concepts like Bash Shell, storage, containers, and advanced system administration tasks. You will also get real-world labs in each lesson so you can practice your skills; along with video solutions so you can assess your progress as you move through the course. The course ends with a practice exam so you can fully prepare for the test day.

ادامه مطلب

Mastering Windows Forensics empowers cybersecurity professionals and digital investigators to uncover compelling evidence on Windows systems. Curated by Grzegorz Tworek, this course delivers targeted instruction on interpreting attack vectors, enhancing forensic analysis, and strengthening endpoint defenses—making it ideal for learners eager to go beyond surface-level insights and take their forensic skills to the next level.

ادامه مطلب

In cybersecurity, most training only scratches the surface—teaching which buttons to press, but not whywhen, or how to adapt when the situation changes. This leaves a critical gap between basic tool familiarity and the deep operational mastery required for real-world engagements. Solo Purple Teaming closes that gap. It trains you to think and operate as both an attacker and a defender, where your limits aren’t dictated by step-by-step lab manuals, but by your creativity, problem-solving skills, and willingness to push beyond your comfort zone and explore new tactics.

ادامه مطلب