دسته: دوره ها

The Threat Hunting Professional Learning Path is an in-depth collection of courses designed for cybersecurity practitioners seeking to develop proactive defense strategies. You’ll start by building a strong core foundation with the fundamentals, then advance through intelligence integration and hunting strategies. You’ll explore both network and endpoint threats, which will give you the practical skills needed to identify threats across a diverse array of environments. You’ll also learn how to effectively document and report findings in a timely and organized manner for post-investigation evidence gathering. By the end of this learning path, you’ll be equipped to carry out threat hunts quickly, efficiently, and in a way that improves and enhances organizational security posture.

ادامه مطلب

Are you interested in learning how to professionally detect, analyze, and respond to real-world security incidents across modern enterprise environments? The Incident Handling & Response Professional Learning Path is designed to introduce you to the full incident response lifecycle and the daily operations of an incident responder, combining practical skills with real-world scenarios and tooling. This learning path will teach you how to prepare for incidents through planning and readiness, detect and triage threats using SIEM and endpoint data, and apply threat intelligence and threat hunting techniques to uncover stealthy attacks. You will also learn how to perform digital forensics to support investigations and response actions. The Incident Handling & Response Professional Learning Path also prepares you for the eCIR exam and certification.

ادامه مطلب

The Advanced Penetration Testing Learning Path provides all the advanced skills required to carry out a thorough and professional penetration test against modern networks and infrastructure, such as the ability to execute state-sponsored-like operations and advanced adversary simulations.

You must be familiar with PowerShell scripting, Active Directory administration and Windows internals knowledge, basic reverse engineering skills, and possess a good working knowledge of network protocols, as the content dives into all stages of a red-teaming engagement.

Learning path at a glance:

  • Implementation details on numerous undocumented attacks
  • Obscure ways of exploitation and backdooring
  • Advanced client-side exploitation techniques
  • Custom attack vector and payload creation
  • Custom payload creation techniques
  • In-depth analysis of Active Directory exploitation
  • Stealthy lateral movement and evasion against modern defenses
  • In-depth analysis of critical domain infrastructure exploitation
  • In-depth details of common misconfigurations and weaknesses
  • Details for covert operations and stealthy persistence

ادامه مطلب

This immersive and comprehensive learning path is designed for penetration testers and IT security professionals aiming to master mobile security. It covers a wide spectrum of topics, including Android and iOS platforms, application security, static and dynamic analysis, and the OWASP Mobile Top 10. You’ll gain hands-on experience with advanced tools like Frida, IDA Pro, and Ghidra, while exploring real-world attack vectors such as reverse engineering, obfuscation bypass, and malware analysis. With advanced modules on hybrid apps and secure mobile app development, you’ll be fully prepared for the eMAPT exam and certification, ensuring your expertise stays current in the rapidly evolving mobile threat landscape.

ادامه مطلب

Embark on the Advanced Web Application Penetration Testing learning path, crafted for professionals seeking to master cutting-edge techniques in web security testing. You’ll begin with essential skills in reconnaissance, mapping, and automation, followed by rigorous training in authentication and session management testing. Dive into advanced injection attacks and API penetration testing, explore sophisticated filter evasion and WAF bypass methods, and gain expertise in server-side attack strategies. This comprehensive learning path provides the advanced skills needed to effectively assess and protect modern web applications against evolving threats.

ادامه مطلب


If you are looking for the most practical way into the exploit development and software security world look no further. The Exploit Development Student Learning Path provides not only the fundamentals of Windows and Linux exploit development but also covers advanced Windows and Linux exploit development techniques, as well as anti-exploit mechanism bypasses.

Learning path at a glance:

  • Based on techniques professional exploit developers use
  • Thoroughly covers fundamental as well as advanced exploitation techniques
  • Software debugging
  • Shellcoding
  • Covers both Windows and Linux exploit development
  • Methodology on how to identify and fully exploit 0-day vulnerabilities
  • Covers bypassing modern anti-exploit mechanisms
  • Learn how to use tools like Immunity Debugger, x32dbg, Mona, Pwntools, GDB, Ropper, etc.
ادامه مطلب