برچسب: Pentesting

Complete collection of Hackers Arise courses, covering Ethical Hacking, Cybersecurity Fundamentals, Linux for Hackers, Penetration Testing, Privilege Escalation, Metasploit, Digital Forensics, Incident Response, OSINT, Network Security, Malware Analysis, and advanced offensive and defensive security techniques.

ادامه مطلب

More than 95 percent of Fortune 500 use Azure today! A huge number of organizations use Azure AD (Entra ID) as an Identity and Access Management platform. This makes it imperative to understand the risks associated with Azure as it contains an enterprises infrastructure, apps, identities and a lot more!

In addition to cloud-only identity, the ability to connect on-prem Active Directory, applications and infrastructure to Azure AD brings some very interesting opportunities and risks too. Often complex to understand, this setup of components, infrastructure and identity is a security challenge.

ادامه مطلب

AI Hacking 101 teaches students the fundamentals of penetration testing for AI/LLM-based applications through self-paced video instruction and guided hands-on labs. Students will learn to detect and exploit common AI vulnerabilities, with practical exercises using a custom-built lab environment featuring a vulnerable chatbot that uses Retrieval-Augmented Generation (RAG) and integrates with a company knowledge base.

ادامه مطلب

The Evasion lab (Certified Evasion Techniques Professional) is designed to equip information security professionals with the expertise needed to bypass defenses in modern enterprise environments. This course delves deep into the techniques and methodologies used to bypass endpoint countermeasures like EDRs. You will gain a comprehensive understanding of Windows internals, including the distinction between user-mode and kernel-mode components, also you will gain a comprehensive understanding of EDRs internals, and how telemetries are collected.

​Throughout the course, you will learn about Windows Internals, reversing EDRs, bypassing  Microsoft Defender for Endpoint (MDE), Elastic EDR, Sysmon weaponizing kernel exploits for defense evasion and bypassing security controls like Protected Processes (PP), Process Protection Light (PPL), Digital Signature Enforcement (DSE), Attack Surface Reduction (ASR) rules and incapacitating Event Tracing for Windows (ETW) telemetry and a lot more .

ادامه مطلب

Are you interested in dissecting malicious software in order to understand its mechanics and purpose? The Malware Analysis Professional Learning Path provides a holistic approach to reverse engineering and analyzing all aspects of malware. During the learning process, you will come across realistic and even real-world malware such as ransomware, botnets, and rats, against which you will perform reverse engineering, static analysis, and dynamic analysis activities.

Learning path at a glance:

  • Learn about IA-32 CPU Architecture
  • Entire module dedicated to x64 bit assembly
  • Practical display and dive into the TLS method
  • Understand how malware uses Windows APIs to achieve their malicious activity
  • Understand and bypass Anti-Reversing techniques
  • Perform full manual unpacking on packed executables
  • Debug samples using different debuggers
  • Learn different methods to locate the important algorithms

ادامه مطلب

The Threat Hunting Professional Learning Path is an in-depth collection of courses designed for cybersecurity practitioners seeking to develop proactive defense strategies. You’ll start by building a strong core foundation with the fundamentals, then advance through intelligence integration and hunting strategies. You’ll explore both network and endpoint threats, which will give you the practical skills needed to identify threats across a diverse array of environments. You’ll also learn how to effectively document and report findings in a timely and organized manner for post-investigation evidence gathering. By the end of this learning path, you’ll be equipped to carry out threat hunts quickly, efficiently, and in a way that improves and enhances organizational security posture.

ادامه مطلب