Cybersecurity
Showing 397–408 of 1211 results
Exam Review Tips and Tricks for CGRC
Obtaining the CGRC certification can be a significant step forward in your career. This course will teach you the standards and processes of Governance, Risk and Compliance that are essential skills in business and are needed for the Certified in Governance, Risk and Compliance examination.
Exam Review Tips and Tricks for CISM®
This course will teach you the skills needed to prepare for the Certified Information Security Manager examination.
Exam Review Tips and Tricks for CISSP®
The CISSP® examination requires thorough knowledge and preparation This course will teach you skills and tips needed for the Certified Information Systems Security Professional examination.
Exam Review Tips and Tricks for CySA+
Achieving a passing score on the CySA+ exam requires knowledge, experience, and preparation. This course will teach you the steps to be successful for the CySA+ exam.
Exam Tips and Tricks for CSSLP®
The CSSLP® examination is tough and requires a comprehensive level of knowledge and the ability to apply that knowledge. This course will teach you the tips and tricks you need for the Certified Secure Software Lifecycle Professional examination.
Execution with Donut
In this course you will learn execution and defense evasion using Donut.
Execution with Unicorn
Are you looking for a tool that simplifies the process of exploiting Windows hosts using a variety of techniques? In this course, you will learn execution using Unicorn.
Exfiltration with CloakifyFactory
This course will teach you Exfiltration using CloakifyFactory.
Exfiltration with Dnscat2
Maintaining access into a targeted network requires multiple C2 channels. In this course, you will learn data exfiltration using dnscat.
Exfiltration with Powershell-RAT
In this course, you will learn exfiltration over alternative protocol: exfiltration over unencrypted/obfuscated non-C2 protocol using Powershell RAT.
Exploitation with Kali Linux
Kali contains an array of tools to assist with security assessments and penetration tests. This course will teach you how to use some of those tools to exploit the systems you find, moving you into a position to perform post exploitation tasks.
Exploitation with PowerShell
Learning about PowerShell exploitation techniques and tools is of vital importance for successfully running red team operations or penetration tests in Windows environments.