[PentesterAcademy] Attacking and Defending Active Directory: Beginner’s Edition

PentesterAcademy – Attacking and Defending Active Directory: Beginner’s Edition [FCO] About Build expertise in attacking and defending real-world enterprise Active Directory environments. What You’ll Learn This is a 4-week beginner-friendly bootcamp, designed to teach security professionals how to identify and analyze threats in a modern Active Directory environment. The bootcamp will cover topics like Active […]

[PentesterAcademy] Linux Rootkits for Red-Blue Teams

  Description: Linux dominates the Server, Embedded and now the Internet of Things (IoT) device market. In recent times, embedded systems and IoT devices in particular have been the weapons of choice in online attacks: botnets like Mirai and Reaper to name a few. Soon the simple attack vectors that these botnets and malware use […]

[PentesterAcademy] Python for Pentesters

  Description This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administrators who want to learn to automate tasks or go beyond just using ready made tools. We will be covering topics in system security, network […]

[PentesterAcademy] Linux Privilege Escalation Bootcamp

  On-Demand: Linux Privilege Escalation Bootcamp   Description Familiarize yourself with beginner-to-advanced privilege escalation techniques on Linux.   What You’ll Learn The focus of this bootcamp is to familiarize you with beginner-to-advanced privilege escalation techniques on Linux. You will learn how to identify and leverage misconfigurations to perform horizontal/vertical escalation. The bootcamp will cover techniques […]

[PentesterAcademy] Container Security | Beginner Edition Bootcamp

  On-Demand: Container Security: Beginner Edition Bootcamp   Description: A hands-on introduction to Container Security, this bootcamp shows you how misconfigured components can lead to breakout attacks and eventually, host compromise.   What You’ll Learn: This is a 4-session beginner bootcamp that will teach you the basics of containers and how to secure them. You […]

[PentesterAcademy] DevSecOps Beginner Edition Bootcamp [2021]

  On-Demand: DevSecOps: Beginner Edition Bootcamp   Description: Get a hands-on introduction to DevSecOps basics with a focus on implementing Devops and DevSecOps pipelines in on-premise, hybrid and on-public cloud models.   What You’ll Learn: This is a 4-session beginner bootcamp that will teach you the basics of DevSecOps. You will learn how to use […]

[PentesterAcademy] Web Application Security Bootcamp [2021]

  On-Demand: Web Application Security: Beginner Edition Bootcamp   Description: A beginner-friendly introduction to the Open Web Application Security Project® (OWASP) Top 10 vulnerabilities, where you will build a solid foundation in pentesting modern web applications with different attack tools.   What You’ll Learn: Web application security is as old as the web. However, today, […]

[PentesterAcademy] Cloud Security: AWS Bootcamp [2021]

  Description Most AWS deployments are breached by a common set of vulnerabilities which attackers repeatedly use. In 5 weeks, this bootcamp teaches you to identify, exploit and secure vulnerabilities in the 5 most commonly used AWS components, so you can be a job-ready Cloud Security practitioner.   What You’ll Learn The syllabus of this […]

[PentesterAcademy] Pandas for Pentesters

  Description: We are now living in a Big Data world – billions of devices communicating over millions of networks and generating petabytes of data, both at rest and in transit! Security professionals now encounter Big Data in the form of large log files, network traffic captures, forensics of large images and exports from security […]

[Pentester Academy] Attacking and Defending Active Directory

Attacking and Defending Active Directory The importance of Active Directory in an enterprise cannot be stressed enough. Used by more than 90% of Fortune 1000 companies, the all-pervasive AD is the focal point for adversaries. Still, when it comes to AD security, there is a large gap of knowledge, which security professionals and administrators struggle […]