What you’ll learn
-
40h video Bootcamp, deep-diving into Ethical Hacking and Threat Hunting subjects
-
4 Courses in 1: #A) Ethical Hacking #B) Threat Hunting #C) Python Hacking Scripting #D) Linux Security Distros
-
+5h Live Hacking Sessions for Hack the Box CTF (Here you become a hacker)
-
+15 hours hands-on Ethical hacking incl. Reconnaissance, Exploitation, ٫Network Attacks, Social Engineering, and 5h WebAPP Pentesting
-
+5 hours Red Teaming, incl. Cobalt Strike Ops and Devs Active Directory Attacks and MITREATT&CK
-
+5 hours Threat Hunting using Elastic-Stack and Wazuh Manager
-
Cobalt Strike, Metasploit, Empire, Python, Kali Linux +200 other industry-proven cybersecurity tools
-
Deploy a complete SIEM with Elastic Stack & Wazuh Manager for real production
-
Master pentest standards and tools, hacking methods with their standards e.g. MITRE ATT&CK, OWASP, PTES
-
2 crash courses included: Python3 scripting and Kali Linux
-
How to perform Web App Attacks such as SQLi, XSS, IDOR, Webshell Upload, Code and Command Injection, and much more
-
Programming Corporate-Level SIEM Use-Cases & Their Common Mistakes
-
How to develop scripting Projects, geared towards IT Security
-
Breach secure systems using client-side & social engineering techniques and tools
-
How corporate-level IT security solutions are planned & developed
-
Develop and conduct Red Team engagement using open source and commercial frameworks
-
Create Malware with Python as well as Cobalt Strike Framework
-
Master OWASP Top 10 best practices and other security standards
-
Pentest on servers, web apps, appliances, corporate networks and Active Directory Forests
-
How to customize your malware agent and make it like windows legitimate traffic and binary
-
Master log aggregation basic concepts with hands-on practices
-
Perform various attack technics using automated as well as manual tools
-
Securely send social engineered & phishing emails disguised as any legitimate email address without authentication
-
How to perform network attacks and sniff sensitive data such as passwords
-
Elastic Stack: Elasticsearch, Kibana and Filebeat in action
-
Master intelligence gathering and reconnaissance using the latest techniques
-
How to map your targets and create network topologies of your targets
-
Linux command line (Kali Linux and Parrot OS Security)
-
How to do lateral movement on secure networks, do privilege escalation and become administrator of the environment
-
How to do attacks on active directory and get domain admin with different techniques
-
Advanced nmap techniques and NSE scripts
-
Master Metasploit framework as your arsenal of exploits