FOR518 is the first non-vendor-based Mac and iOS incident response and forensics course that focuses students on the raw data, in-depth detailed analysis, and how to get the most out of their Mac and iOS cases. The intense hands-on forensic analysis and incident response skills taught in the course will enable analysts to broaden their capabilities and gain the confidence and knowledge to comfortably analyze any Mac or iOS device.

ادامه مطلب

FOR508 is an advanced course designed for cybersecurity professionals who need to detect, investigate, and respond to sophisticated cyber threats, including advanced persistent threats (APTs) and targeted attacks. The course teaches cutting-edge digital forensics, threat hunting, and incident response techniques to track adversaries across compromised enterprise environments.

ادامه مطلب

FOR498 is a specialized course designed for digital forensics professionals and incident responders who need to quickly acquire and assess evidence during critical cyber incidents. The course focuses on rapid data acquisition, efficient forensic analysis, and initial triage processes to support timely decision-making and incident response.

ادامه مطلب

FOR500 is a specialized course designed to equip digital forensics professionals with the skills needed to investigate and analyze Windows-based systems. The course focuses on extracting and analyzing digital evidence from Windows operating systems, including artifacts related to user activity, system events, malware infections, and cyber attacks.

ادامه مطلب
Have you ever wondered about how web applications are attacked in the real world and what you can do to mitigate every attack? The Web Defense Professional Learning Path will illustrate exactly how each attack works, what the impact of each attack is, how to fix it, and how the exploit no longer works after the fix. This learning path will also give you in-depth, practical advice about how to simplify your defense and how to implement attack mitigations that actually work (regardless of you having access to the source code or not). In addition, it will cover mitigation advice for multiple platforms and languages, the OWASP Testing Guide, detailed techniques and methodology to simplify the defense of web applications, advanced usage of OWASP ZAP, OWASP OWTF, ModSecurity, and more. The Web Defense Professional Learning Path also prepares you for the eWDP exam and certification.
ادامه مطلب

The Advanced Penetration Testing Learning Path provides all the advanced skills required to carry out a thorough and professional penetration test against modern networks and infrastructure, such as the ability to execute state-sponsored-like operations and advanced adversary simulations.

You must be familiar with PowerShell scripting, Active Directory administration and Windows internals knowledge, basic reverse engineering skills, and possess a good working knowledge of network protocols, as the content dives into all stages of a red-teaming engagement.

Learning path at a glance:
-Implementation details on numerous undocumented attacks
-Obscure ways of exploitation and backdooring
-Advanced client-side exploitation techniques
-Custom attack vector and payload creation
-Custom payload creation techniques
-In-depth analysis of Active Directory exploitation
-Stealthy lateral movement and evasion against modern defenses
-In-depth analysis of critical domain infrastructure exploitation
-In-depth details of common misconfigurations and weaknesses
-Details for covert operations and stealthy persistence

eCPTX

ادامه مطلب