Cybersecurity
Showing 961–972 of 1317 results
Reconnaissance with EyeWitness
Reconnaissance is the first and most important phase of any red team engagement. In this course, we will explore actively scanning websites and hosts using EyeWitness to gather information about targets and their organizations.
Reconnaissance with Gobuster
Performing reconnaissance is one of the most important phases in a red team exercise. In this course, you will learn active scanning and host enumeration using GoBuster.
Reconnaissance with OWASP Amass
The first step on a red team exercise is the Reconnaissance phase. In this course we cover the OWASP Amass tool, which allows you to enumerate domains and find potential attack vectors on your target.
Reconnaissance with Shodan
Shodan is a search engine that continuously scans the internet identifying internet-connected devices and can be used to plan future red team operations. In this course, you will learn Reconnaissance using Shodan.
Reconnaissance with Sn1per
Reconnaissance is one of the most important stages of a red team exercise. In this course, we cover the Sn1per tool, which allows you to perform passive and active reconnaissance against your target.
Reconnaissance with Spiderfoot
Spiderfoot is an automation platform for open source intelligence and can be used to plan red team operations. In this course, you will learn reconnaissance using Spiderfoot.
Red Team Operations: Target and Capability Development
Hey Humans! Come join us for an exciting adventure and Red Team Operation! In this course, we will be discussing the scenario and how to set up infrastructure and planning for your operation.
Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK
Red team operations are most effective when tailored to test an organization's defenses against the most likely threat. Learn to leverage MITRE ATT&CK in combination with open source tools in the red team tools path to emulate APT attacks.
Redhat Linux Administrator-Module 1
Grab Level 1 Knowledge Linux by availing this course
regreSSHion – an OpenSSH RCE Vulnerability: What You Should Know
Get to know how you might be affected by regreSSHion, an OpenSSH vulnerability that allows for remote code execution, and learn what you can do to assess and mitigate the impact.
Regulating Resource Usage Using Google Cloud IAM
This course focuses on the design and implementation of role-based access control (RBAC) on the GCP. This includes the creation and appropriate use of service accounts, as well as primitive, predefined, and custom roles.
Reporting and Communication for CompTIA Pentest+
Reporting is the last and one of the most important phases in a pentest. It is where you communicate our work to the client. This course will teach you the reporting and communication skills needed for the CompTIA Pentest+ exam.