Ethical Hacking
Showing 13–24 of 108 results
Credential Access with Mimikatz 2
In addition to other functionality, Mimikatz extracts password hashes and clear-text credentials from system memory. Mimikatz can also manipulate domain account passwords or display protected credentials stored in files.
Credential Access with Responder
After getting initial access in a network, your next task is to move laterally and escalate privileges. In this course, you will see the Responder tool which allows you to exploit vulnerabilities on the LLMNR and NBT-NS protocols to get credentials
Credential Access with THC Hydra
THC Hydra is a fast and powerful parallelized network login cracker with support for a wide variety of network protocols. Skill up your brute forcing techniques by leveraging THC Hydra to identify weak passwords.
CyberArk Fundamentals
This course will teach you how to implement CyberArk product sets for PAM and Identity.
Defense Evasion with Meterpreter
Learning Defense Evasion is a prerequisite for using Metasploit tooling successfully in a secure environment. This course will teach you how to stay under the radar and evade detection even in highly secure environments.
Digital Forensics: The Big Picture
Digital devices are everywhere, along with digital crime and the corresponding evidence. This course will teach you all about this field and give you the foundational knowledge needed to make informed decisions about your digital future.
Discovery with ADRecon
In this course, we cover the ADRecon tool, which allows you to extract valuable information from the Active Directory, including users, security groups, computers, security policies, and even Kerberos tickets.
Discovery with Kismet
In this course, you will learn Discovery using Kismet.
Eliminating Security Vulnerabilities with NPM 6 Audit
Security is a critical piece of any production software, and although it can be tempting to ignore it, doing so will only delay the inevitable. With the npm audit command, addressing security issues is now easier than ever.
Enumerating the Network Infrastructure as a Forensics Analyst
This course will teach you how to apply your theoretical knowledge of networking to both real time and post incident forensic analysis of network based data.
Ethical Hacking: Cloud Computing
Welcome to Ethical Hacking: Cloud Computing. This course will teach you cloud security concepts needed for the Certified Ethical Hacking Exam.
Ethical Hacking: Cryptography
Cryptography isn’t as secure as you think. This course will teach you how attackers look at cryptography for the CEH 312-50 exam.