برچسب: Pentest

This course teaches the foundations of satellite cybersecurity by guiding you through the reconnaissance, communication dissection, decoding, and vulnerability analysis of satellite systems through interactive activities and tutorials. Learn about the underlying concepts of what makes satellite network infrastructure function and apply your knowledge to conduct digital forensics on real life satellites in orbit.

Syllabus

Satellite Reconnaissance

Communication Analysis and Eavesdropping

Reverse Engineering and Decoding Communication

Vulnerabilities and Attacks

Aerospace Cybersecurity: Satellite Hacking (W53)

ادامه مطلب

In this course you will set up EC-Council’s Mobile Security Toolkit (STORM) OS to interface with your drone, then learn about drone hacking. This will include a wide arrange of topics from the basics of drones and the FCC rules, to the capture, examination, and exploitation of drone data.

Syllabus

Technical Introduction Drone Hacking
Core UAV Technology
UAV Robotics as an ecosystem
Wireless Recon
Drone Hacking

EC-Council: Drone Hacking Workshop

ادامه مطلب

This is an on-demand full hands-on training that focuses on developing cyber weapons that can evade AV detection, EDR logs and forensics traces like how advanced targeted attacks do, and provide you with insights on how to improve your organization’s overall detections and security posture

Syllabus

MODULE 00: Welcome & Intro

MODULE 01: APT Attacks & Red Team Infrastructure on AWS

MODULE 02: Phishing & Social Engineering Mastery

MODULE 03: Initial Access: Get your foot into the organization network

MODULE 04: Write Your Own HTTP Malware

MODULE 05: Implement a Plugin Framework in your Malware With Keylogger Plugin

In-Depth Red Teaming: APT & Adversary Simulation

ادامه مطلب

The course, “Cybersecurity ATTACK & DEFENSE: The Foundations”, is a comprehensive training program designed to provide the fundamental skills and roadmap needed for a successful career in cybersecurity. The course is divided into three main modules:

ATTACK: This module teaches how elite hackers infiltrate the world’s most secure networks, providing a foundation for careers in penetration testing and red team operations.
RESPOND: This module focuses on how cybersecurity experts protect their organizations against advanced attacks. It covers essential skills for working in incident response and threat hunting.
INVESTIGATE: This module instructs on how to perform a deep investigation of targeted attacks’ tools and malware, including static and dynamic analysis on a malicious file.
The course also includes a bonus module on Fileless Attacks & Targeted Ransomware Attacks1. The curriculum is hands-on and includes real-world scenarios, making it an excellent starting point for careers in incident response and malware analysis.

Syllabus

  1. Module 01 – ATTACK

  2. Module 02 – RESPOND

  3. Module 03 – INVESTIGATE

ادامه مطلب

The course “Attacking and Defending Azure & M365” is a comprehensive training program offered by Xintra. It provides an in-depth understanding of attack techniques, detection, forensics, and mitigation strategies on Azure and Microsoft 365. The course is designed to be hands-on and includes practical labs for real-world learning. It is suitable for individuals interested in cybersecurity, particularly in the context of Azure and Microsoft 365 environments. The course is self-paced, allowing learners to progress at their own speed, and also includes live sessions for interactive learning.

Syllabus

1. Introduction
2. Overview of Azure/M365
3. Setting Up Your Environment
4. Log Analysis Using SOF-ELK
5. Reconnaissance & Enumeration
6. Initial Access Techniques
7. Credential Theft
8. Lateral Movement Techniques
9. Privilege Escalation
10. Persistence Techniques
11. Defense Evasion

Attacking and Defending Azure & M365

ادامه مطلب

SEC661 is designed to break down the complexity of exploit development and the difficulties with analyzing software that runs on IoT devices. Students will learn how to interact with software running in ARM environments and write custom exploits against known IoT vulnerabilities.

Syllabus

SEC661.1: ARM Exploit Fundamentals

SEC661.2: Exploiting IoT Devices

SEC661: ARM Exploit Development

ادامه مطلب