Showing 1081–1092 of 4482 results

Creating Virtual Team Communication Plan
Streamline your existing team communication plan or build one from scratch that will improve speed, clarity, boost performance, and minimize interruptions, misunderstandings, and headaches.

Creating Web Applications with Go
Since Go was first open sourced in 2009, it's rapidly grown in popularity. This course is targeted at software developers that are looking at using the Go language to create web applications.

Creating Web Part Customizations Using SharePoint Framework
SharePoint Framework is a must know if you are working as a developer with SharePoint or Microsoft 365. It opens up the ability to make SharePoint yours again and do with it as you’d like.

Creating Web Services with Go 1
In this course you will build restful web services using Go’s standard library.

Creating, Connecting, and Monitoring Databases with Amazon RDS
Amazon RDS provides hosting services for several different database engines. Explore how to create, connect to, and monitor the five third-party database engines.

Credential Access with Cain & Abel
From manipulating network traffic to cracking user credentials, this course will give you the skills and understanding to further your red teaming objectives towards exploitation, credential access, and lateral movement.

Credential Access with Hashcat
Hashcat is the number one offline password cracker used by red team members and penetration testers. If you want to learn how to use Hashcat to crack passwords with different password cracking techniques, then this course is for you.

Credential Access with John the Ripper
John the Ripper (JtR) is widely used within red team assessments. Learn how to leverage the powerful capabilities of JtR to crack passwords of various hash types and use JtR within Metasploit.

Credential Access with LaZagne
In this course, you will learn privilege escalation using LaZagne, a post-exploitation tool used to recover credentials from a system.

Credential Access with Mimikatz 2
In addition to other functionality, Mimikatz extracts password hashes and clear-text credentials from system memory. Mimikatz can also manipulate domain account passwords or display protected credentials stored in files.

Credential Access with Responder
After getting initial access in a network, your next task is to move laterally and escalate privileges. In this course, you will see the Responder tool which allows you to exploit vulnerabilities on the LLMNR and NBT-NS protocols to get credentials

Credential Access with THC Hydra
THC Hydra is a fast and powerful parallelized network login cracker with support for a wide variety of network protocols. Skill up your brute forcing techniques by leveraging THC Hydra to identify weak passwords.