Cybersecurity
Showing 145–156 of 1211 results
Cloud Infrastructure Analysis with Scout Suite
With cloud services exploding in numbers and complexity, it is impossible to manually identify all dangerous configurations. With Scout Suite, you will find those dangerous configurations, and then resolve them on an AWS environment.
Cloud Security Operations for CCSP®
This course will teach you security operations responsibilities related to the consumer needed for the CCSP exam.
Collection Is Not Detection and Other Rules for Modernising Sec Ops
In this talk, Sarah Young will discuss how security operations change from on-prem to the cloud and how to optimize your security operations in a hybrid environment to make use of modern tooling such as automation and AI/ML.
Collection with PowerUpSQL
In a red team engagement, it is crucial to collect sensitive information to demonstrate the impact of a cyber attack to your client. This course will teach you how to collect sensitive data from Microsoft SQL databases using the PowerUpSQL tool.
Command and Control with Covenant
Covenant C2 command and control uses just-in-time, in-memory, .NET compilation, and dynamic profiles to fool defensive detections. Skill up your red team techniques by leveraging the next generation of adversary command and control capabilities.
Command and Control with Empire
PowerShell has quickly become the standard in enterprise networks. In this course you will learn how to leverage Empire to perform command and control techniques during a red team engagement.
Command and Control with Merlin
In this course, you will learn Command And Control using Merlin. Merlin’s “magic” is in the usage of modules (for attack automation), HTTP/3 (for evading packet inspection), and Golang (for cross-compiling agents on multiple Operating Systems).
Command and Control with PoshC2
PoshC2 is a powerful tool that uses PowerShell to control a victim system toward furthering red teaming objectives beyond exploitation throughout the remaining life of an engagement. In this course, you will learn Command and Control using PoshC2.
Command and Control with Pupy
Learn how to use the Pupy server to connect to exploited clients over different encryption protocols and use these sessions to run additional attacks, dump credentials, and collect information.
Command and Control with Sliver
Are you looking for a versatile command and control server with implants for almost every architecture? In this course, you will learn Command and Control using Sliver.
Common Vulnerabilities and Exploits with Python
Just like any other programming language, Python can also be used by attackers to conduct malicious actions. This course will teach you how to prevent common vulnerabilities with Python.
Communication and Network Security for CISSP®
This course will teach you secure network design and operations needed for the Certified Information Systems Security Professional exam.