Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
The SANS SEC540 DevSecOps training course prepares security professionals to secure cloud-native and DevOps environments by implementing security controls in automated pipelines. It addresses challenges like insecure CI/CD pipelines, misconfigurations, and Kubernetes vulnerabilities while...
Tailored for beginners
Includes study materials such as videos and PDF slides
Covers the fundamentals of exploit development
Provides an in-depth understanding of stack exploitation
Ideal for anyone looking to jump-start their journey into exploit development
The course contents are divided...
Advanced Azure Attacks - Advanced
Azure is widely used by enterprises for a variety of purposes. There is a huge offering of services across various categories in Azure - Identity, Compute, Networking, Storage, Databases, Analytics, Security and many more.
Azure, like any other cloud, changes...
Course Overview
Advanced Web Hacking is designed to take your web penetration testing skills to the next level. This course dives deep into advanced topics, exploring edge-case vulnerabilities, sophisticated attacks, and complex scenarios faced in modern web applications. Each module will offer...
SEC450 provides students with technical knowledge and key concepts essential for security operation center (SOC) analysts and new cyber defense team members. By providing a detailed explanation of the mission and mindset of a modern cyber defense operation, this course will jumpstart and empower...
Offensive Development w Greg Hatcher & John Stigerwalt
In the Intro to Offensive Tooling class, you will learn about many of the tools used by attackers to identify vulnerabilities and exploit them. This hands-on course covers a variety of offensive tools, such as Nmap, Recon-ng, Metasploit...
SEC530: Defensible Security Architecture and Engineering: Implementing Zero Trust for the Hybrid Enterprise
This course is designed to help students establish and maintain a holistic and layered approach to security, while taking them on a journey towards a realistic 'less trust' implementation...
Malware Analysis Basics
Overview
This 16-hour on-demand course provides a hands-on, virtual beginner's introduction to the tools and methodologies used to perform malware analysis on executable files found on Windows systems. The course introduces students to the field of disassembly, including...
Attacks on Cloud Infrastructure: AWS, Azure, and Google Cloud Under the Microscope
The adoption of cloud services has grown exponentially in recent years, offering companies scalability, efficiency, and flexibility. However, this advancement has also brought a broader attack surface and new...
FOR500: Windows Forensic Analysis
GIAC Certified Forensic Examiner (GCFE)
FOR500 builds in-depth and comprehensive digital forensics knowledge of Microsoft Windows operating systems by analyzing and authenticating forensic data as well as track detailed user activity and organize findings. It...
Azure Application Security Lab (CAWASP)
Azure Application Security Lab Objectives:
Applications are vital components of an enterprise. Hence application security also becomes an integral part of the enterprise network that helps prevent security vulnerabilities against various threats...
AD CS Attacks for Red and Blue Teams Lab Objective:
Identity plays a crucial role in security of an enterprise environment. Certainly, Identity is the new security perimeter. In an enterprise environment, Identity is usually managed by Active Directory or by Azure AD in case of a Hybrid...
In-Depth Red Teaming: APT & Adversary Simulation
This is an on-demand full hands-on training that focuses on developing cyber weapons that can evade AV detection, EDR logs and forensics traces like how advanced targeted attacks do, and provide you with insights on how to improve your...
You’ve heard this story before. Bad actor walks into a network and pillages the place in swift action. CIO asks: “Where did we go wrong?” SysAdmin replies “our password, remote access, workstation restriction, and lack of application safelisting policies. Oh, and our SIEM didn’t notify us. We...
101 Labs - Book Series
Experts agree that we retain only 10% of what we read but 90% of what we do. Perhaps this explains why the global pass rate for most IT exams is a ghastly 40%. This is where the 101 Labs book series can help. We are revolutionizing how IT people train for their exams and...
Table of Contents
About the Authors
Introduction—101 Labs
Lab 1. Credential Harvesting Using Site Cloning
Lab 2. Nmap
Lab 3. Recon-ng
Lab 4. Conducting a Dictionary Attack to Crack Online Passwords Using Hydra
Lab 5. Conducting a Cross Site Scripting (XXS) Attack
Lab 6. Automating SQL...
CTFs or Pentest Labs platform links
please verify and comment
============================={
Enlaces de plataformas de CTFs o Pentest Labs
porfavor verificar y comentar
Hidden content
Listado con los próximos eventos/charlas/labs que se realizaran en España... algunos de ellos están indefinidos, pero esta la web para que pueda ser consultado.
Espero lo disfrutéis y poder veros en alguno..
Evento;Fecha;Lugar
CISO Day 2019 (https://cisoday.es/);2019/06/12;
C1b3rWal...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.