برچسب: Security

Learn Kerberos from Tim Medin – the creator of Kerberoasting, and get hands-on with the real-world attacks, tools, and defenses every modern penetration tester needs to know. you’ll go beyond surface-level explanations and dive deep into how Kerberos truly works. You’ll break down the structure of tickets, how they’re encrypted and signed, and why each piece matters for both defense and attack scenarios. More importantly, you’ll learn these concepts from Tim Medin, the creator of the Kerberoasting and one of the foremost experts in enterprise penetration testing.

ادامه مطلب

Complete collection of Hackers Arise courses, covering Ethical Hacking, Cybersecurity Fundamentals, Linux for Hackers, Penetration Testing, Privilege Escalation, Metasploit, Digital Forensics, Incident Response, OSINT, Network Security, Malware Analysis, and advanced offensive and defensive security techniques.

ادامه مطلب

Adversary Perspectives: Azure is the first installment in the SpecterOps Adversary Perspectives series. Known for our Adversary Tactics courses, we realized that there is often a gap of understanding that needs to be bridged before a practitioner is ready to start taking offensive or defensive actions in a particular environment. While other courses aim to simply build basic knowledge from a general user standpoint, this Adversary Perspectives class looks to teach security professionals from the viewpoint of an attacker. Don’t just look at your security posture in Azure, actually understand the abuse mechanisms and holistic security of your deployment.

Participants will build on this knowledge through an understanding of how Azure architectures, like solely cloud-based environments or hybridized on-premises and Azure environments, can affect the overall security of an environment. Throughout the course, participants will reinforce what they learn through hands-on labs and instruction given by SpecterOps practitioners.

ادامه مطلب

Security Operations (SOC) 201 is an intermediate security operations course designed to enhance your skills in detecting, investigating, and responding to complex cyber threats at scale. After establishing fundamental security operations knowledge and practical skills in SOC 101, the next logical step is to progress your career by applying advanced investigation methodologies and grasping the responsibilities of an Incident Responder and Threat Hunter. The SOC 201 curriculum teaches analysts how to identify, hunt, and respond to real-world adversary tactics and techniques. With a practical, hands-on focus, the curriculum provides realistic scenarios where students investigate sophisticated threats across multiple systems, learning to detect and respond effectively in enterprise-scale environments. The course also integrates proactive threat hunting as part of a continuous detection and response cycle, giving analysts the mental models to identify active threats, uncover gaps, and feed insights back into investigative processes to improve future detection and response efforts.

ادامه مطلب

Are you ready to level up and gain hands on experience in cybersecurity?  Introducing The Complete Cybersecurity Analyst Course — your one-stop solution for mastering the skills and gain hands on experience you need to excel in the cybersecurity field.

ادامه مطلب

Learn what Amazon S3 is, how it works, and how to protect your data. This course will show you how to create and configure buckets, upload and access objects, avoid common security misconfigurations (some of which have resulted in massive breaches), and how to run regular automated scans with open source tools to discover issues. You’ll also learn to think like an attacker to find weaknesses that could potentially be exploited. The course was designed to provide a heavy dose of hands-on, practical learning with a mixture of taking action through the console, CLI, and roles.

ادامه مطلب