Showing 16009–16020 of 18767 results
Specialized Exploits: Stack Overflows and Bypasses
This course will teach you the essential skills required to craft Linux and Windows stack-based buffer overflow attacks.
Specialized Exploits: Windows and Linux Shellcode
This course will teach you the essential skills required to craft Linux and Windows x86 shellcode, harnessing them using basic C/C# and PowerShell code.
Specialized Hunts: Threat Hunting within Active Directory
Active Directory is used in most medium and large companies, making it a significant target for abuse. This course will teach you how to hunt for threats in Active Directory to uncover malicious activity rapidly, allowing you to respond faster
Specialized Hunts: Threat Hunting within Mail Servers
This course will teach you how you can perform threat hunting analysis on email servers.
Specialized Hunts: Threat Hunting within Virtual Machines
VMs are part of the environment in which an adversary can operate. This course will teach you how to set up and perform a specialized threat hunt within VMs.
Specialized Models: Time Series and Survival Analysis
This course introduces you to additional topics in Machine Learning that complement essential tasks, including forecasting and analyzing censored data.
Specialized Testing: API Testing
In the age of APIs, ensuring their bullet-proof security is paramount. This course will teach you how to probe APIs for different injection vulnerabilities, gather pentesting information, and use it to potentially exploit such vulnerabilities in APIs
Specialized Testing: Command Injection
Poor web application security hygiene can lead to total network compromise. This course will teach you to identify the vectors and techniques threat actors use to gain access to networks and systems using command injection.
Specialized Testing: CSRF
This course will teach you how to test for Cross-site Request Forgery (CSRF), a common attack against web applications.
Specialized Testing: Deserialization
Insecure deserialization vulnerabilities are frequently encountered in web applications. This course will teach you how to test for and exploit these vulnerabilities in web applications.
Specialized Testing: Sessions and Tokens
Most web applications use sessions or tokens to maintain state or to implement authentication – and many can be attacked there. This course will teach you how to test for these kinds of vulnerabilities.
Specialized Testing: SQL Injection
This course will teach you how to test for SQL injection, one of the most common security issues in desktop and web applications alike.