• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

#redteamvsblueteam

  1. dEEpEst

    ITProTV – LPIC-1 Linux Administrator (101-500) 10GB 2024

    The course begins by introducing the foundational concepts of working with variables and basic scripting, setting the stage for more advanced scripting techniques. It delves into the intricacies of the Linux operating system, including the X11 and Xorg configuration. As the course progresses...
  2. dEEpEst

    Android Userland Fuzzing & Exploitation Course 20 GB

    Elevate Your Mobile Security Skills! with Android fuzzing & exploitation secrets through 9 modules, real-world labs, and a professional certification. Course Structure 01 Lab Setup 1 Lab Setup - Outline 00:28 1.1 Slack channel 00:18 1.2 Mobile Hacking Lab VM 01:40 1.2 Mobile Hacking Lab Cloud...
  3. dEEpEst

    OffSec - TH-200 OSTH 2025

    TH-200: Foundational Threat Hunting OffSec’s Foundational Threat Hunting (TH-200) equips cybersecurity professionals with the practical skills and knowledge needed to effectively detect and respond to threats. This course covers core threat hunting concepts, exploring the methodologies used by...
  4. dEEpEst

    OffSec - IR-200 OSIR 2025

    IR-200: Foundational Incident Response OffSec’s Incident Response Essentials (IR-200) course provides cybersecurity professionals with practical training to prepare for, identify, and handle security incidents effectively. The course focuses on core incident response concepts and explores how...
  5. dEEpEst

    Azure Security Engineer Associate (AZ-500) 2025 6GB Duration 83 hours

    IT environments require rock-solid security solutions. This is true whether they are on-premises, in the cloud, a combination of both. Azure, as a leading cloud platform, has a thorough portfolio of security features and solutions. The Microsoft Certified: Azure Security Engineer Associate...
  6. dEEpEst

    Practical Web Application Security and Testing 2025-01-30

    Practical Web Application Security and Testing is an entry-level course on web application technologies, security considerations for web application development, and the web application penetration testing process. We begin with the basics of HTTP, servers, and clients, before moving through...
  7. dEEpEst

    ITProTV - LPIC-2 Linux Engineer (202-450) 10GB 2025

    The LPIC-2 Linux Engineer (202-450) course is designed for IT Professionals who are seeking the LPIC-2 certification. The course covers skills required of any intermediate to advanced systems administrator who is tasked with supporting Linux in a production Content +---ITProTV - LPIC-2 Linux...
  8. dEEpEst

    Pentest Red Team Techniques - Credential Access

    Credential Access The adversary is trying to steal account names and passwords. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credential include keylogging or credential dumping. Using legitimate credentials can give...
  9. dEEpEst

    Pentest Red Team Techniques - Defense Evasion

    Defense Evasion The adversary is trying to avoid being detected. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and...
  10. dEEpEst

    Pentest Red Team Techniques - Privilege Escalation

    Privilege Escalation The adversary is trying to gain higher-level permissions. Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require...
  11. dEEpEst

    Pentest Red Team Techniques - Persistence

    Persistence The Adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access...
  12. dEEpEst

    ITProTV - LPIC-2 Linux Engineer (201-450) 8GB 2025

    There's a brand new course on ITProTV: LPIC-2 Linux Engineer (201-450). Check it out now by creating an account at https://www.itpro.tv/. The LPIC-2 Linux Engineer (201-450) course is designed for IT Professionals who are seeking the LPIC-2 certification. The course covers skills required of any...
  13. dEEpEst

    SentinelOne – Threat Hunting course 3GB

    Stealth Cyber Operator [CSCO] Red Team Resource Development [Infra Setup] Abuse improperly placed and mis-configured security controls in infrastructure Trade-craft development for Offensive Operations Resource abuse using Windows APIs, C, C++ & Csharp Utilizing Trade-craft for Red Teaming in...
  14. dEEpEst

    Pentest Red Team Techniques - Execution

    Red Team Techniques Execution The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve...
  15. dEEpEst

    Pentest Red Team Techniques - Initial Access

    Red Team Techniques Initial Access The Adversary is trying to get into your Network Initial Access consists of techniques that use various entry vectors to gain their initial foot hold within a network. Techniques used to gain a foothold include targeted spear phishing and exploiting...
  16. dEEpEst

    Advanced Web Application Penetration Testing (New 2025!) 2025 15GB - Duration 67 Hours

    Embark on the Advanced Web Application Penetration Testing learning path, crafted for professionals seeking to master cutting-edge techniques in web security testing. You’ll begin with essential skills in reconnaissance, mapping, and automation, followed by rigorous training in authentication...
  17. dEEpEst

    Bug Bounty Hunting and Penetration Testing v2 2025-01-12

    About Course Building on the foundation of Bug Bounty V1, this course dives deeper into advanced vulnerability exploitation. It focuses on specific threats such as SQL Injection, HTML Injection, Clickjacking, and Server-Side Request Forgery (SSRF). Participants will engage in hands-on...
  18. dEEpEst

    Bug Bounty Hunting and Penetration Testing v1 2025-01-12

    About This course offers a comprehensive introduction to identifying and responsibly exploiting application vulnerabilities. It covers Web Application Architecture fundamentals and the critical OWASP Top 10. Participants will learn to distinguish Bug Bounty Hunting from Penetration Testing...
  19. dEEpEst

    Stealth Cyber Operator [CSCO] 02/2024 3GB

    Stealth Cyber Operator [CSCO] Red Team Resource Development [Infra Setup] Abuse improperly placed and mis-configured security controls in infrastructure Trade-craft development for Offensive Operations Resource abuse using Windows APIs, C, C++ & Csharp Utilizing Trade-craft for Red Teaming in...
  20. dEEpEst

    CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide 12 GB 2024 (Arabic language)

    CompTIA Security+ Certification (SY0-601) Welcome to the TOTAL: CompTIA Security+ Certification (SY0-601), a course from the production studios of Total Seminars with subject matter experts Mike Meyers and Dan Lachance. Since the requirements and costs are high (the exam voucher is $392)...
Back
Top