Description: Linux dominates the Server, Embedded and now the Internet of Things (IoT) device market. In recent times, embedded systems and IoT devices in particular have been the weapons of choice in online attacks: …
Category: Pentester Academy
Description This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administrators who want to learn …
On-Demand: Linux Privilege Escalation Bootcamp Description Familiarize yourself with beginner-to-advanced privilege escalation techniques on Linux. What You'll Learn The focus of this bootcamp is to familiarize you with beginner-to-advanced privilege escalation techniques …
On-Demand: Container Security: Beginner Edition Bootcamp Description: A hands-on introduction to Container Security, this bootcamp shows you how misconfigured components can lead to breakout attacks and eventually, host compromise. What You'll Learn: …
On-Demand: DevSecOps: Beginner Edition Bootcamp Description: Get a hands-on introduction to DevSecOps basics with a focus on implementing Devops and DevSecOps pipelines in on-premise, hybrid and on-public cloud models. What You'll Learn: …
On-Demand: Web Application Security: Beginner Edition Bootcamp Description: A beginner-friendly introduction to the Open Web Application Security Project® (OWASP) Top 10 vulnerabilities, where you will build a solid foundation in pentesting modern web …
Description Most AWS deployments are breached by a common set of vulnerabilities which attackers repeatedly use. In 5 weeks, this bootcamp teaches you to identify, exploit and secure vulnerabilities in the 5 most commonly …
Attacking and Defending Active Directory The importance of Active Directory in an enterprise cannot be stressed enough. Used by more than 90% of Fortune 1000 companies, the all-pervasive AD is the focal point for adversaries. …