دسته: دوره ها

The RED TEAM Operator: Malware Development Advanced – Vol. 2 is an in-depth, hands-on course focused on advanced Windows kernel malware development techniques, expanding on the concepts from Vol. 1. Over 42 video lessons, learners explore topics such as direct kernel object manipulation (DKOM), privilege escalation via token manipulation, kernel-level process protection, ETW tampering, and removing kernel callbacks, as well as identifying and bypassing vulnerable driver blocklists. The program includes a ready-to-use VM image, complete source code templates, transcripts, and supplementary materials, all accessible for 365 days. Designed for skilled C/C++ programmers with solid Windows and OS architecture knowledge, this course is ideal for ethical hackers, red and blue team professionals, and security researchers aiming to master advanced offensive techniques at the kernel level.

ادامه مطلب

EC-Council’s CHFI program prepares cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and bring their organization into a state of forensic readiness. This includes establishing the forensics process, lab and evidence handling procedures, as well as the investigation procedures required to validate/triage incidents and point the incident response teams in the right direction. Forensic readiness is crucial as it can differentiate between a minor incident and a major cyber-attack that brings a company to its knees.

This intense hands-on digital forensics program immerses students in over 68 forensic labs, enabling them to work on crafted evidence files and utilize the tools employed by the world’s top digital forensics professionals. Students will go beyond traditional hardware and memory forensics and learn current topics such as cloud forensics, mobile and IoT, investigating web application attacks, and malware forensics. C|HFI presents a methodological approach to computer forensics, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.

ادامه مطلب

This is an intensive live training designed for cybersecurity professionals to master malware analysis, memory forensics, and enterprise-scale incident response. The curriculum uses real-world attack samples, including ransomware and APT toolkits, within risk‑free environments.

ادامه مطلب

This course is an on‑demand, self‑paced training offering foundational skills in Linux system navigation and administration. Tailored for aspiring IT professionals and cybersecurity learners, it equips you with essential command-line proficiency and system management capabilities.

ادامه مطلب

A foundational training program focused on the core principles and practical skills of digital forensics – geared toward those entering the field or strengthening basic investigative capabilities.

ادامه مطلب

Learn how to use sqlmap in-depth for professional engagements like pentests or bug bounties. sqlmap is the most powerful and widely used SQL injection tool, and for good reason. It packs an impressive array of features and options specifically crafted to fingerprint, enumerate, and takeover databases as well as underlying systems. In this course, we take a look at all of that. We start by looking at the sqlmap project, including how the source code repository is structured, where to find important files such as configuration and payload files, and how to set up a home lab environment to safely and legally practice what we’re learning. Then, we explore every single option that sqlmap offers with examples and explanations of how and when to use the option(s). We learn tips & tricks to see what sqlmap is doing under the hood and to troubleshoot when we come across issues. Once we’ve covered sqlmap’s options and features, we tie it all together by running through scenarios. This is when we get to see how those options can be used together or on their own to achieve our pentest or bug bounty objectives. The course also includes sections dedicated to specific topics such as bypassing WAFs and evading security controls, and how to run sqlmap as an API.

ادامه مطلب