Incident Response - Best Practices and Techniques
Computer History: The Development of Programming Languages
Advanced Threat Hunting - Memory Forensics-Based Threat Hunting Techniques
Red Teaming - OSINT Techniques for Social Engineering
Cloud Security - Serverless Security Best Practices
Python - Advanced Python Debugging: Debugging Performance and Memory Issues
Computer History: The Role of Atari in the Home Computing Market
Advanced Malware Analysis - Dynamic Analysis Techniques
Cyber Threat Intelligence - Dark Web Analysis and TOR Investigations
IoT Security - Securing Smart Cities and Critical Infrastructure
Ruby - Rails Routing: Advanced Routing Concepts and Techniques
Computer History: The Birth of Gaming Consoles with the Release of the Nintendo Entertainment System
Advanced Threat Hunting - Fileless Malware Detection Techniques
Purple Teaming - Integrating Red and Blue Team Operations
Advanced Social Engineering - Vishing and Smishing
Python - Python Libraries for Data Science: Exploring Pandas, Numpy, and Other Popular Libraries
Computer History: The Emergence of Graphical User Interfaces and Windowing Systems
Advanced Memory Forensics - Malware Detection and Analysis
Cyber Threat Intelligence - Collection and Analysis Techniques
Advanced Web Application Security - Server-Side Request Forgery (SSRF)
Rust - Rust Memory Management: Advanced Concepts and Techniques
Computer History - The Development of CD-ROM Technology
Advanced Exploit Development - Return-Oriented Programming (ROP)
Cyber Threat Hunting - Techniques and Best Practices
Network Protocol Analysis - Wireshark and tcpdump
JavaScript - Advanced DOM Manipulation: Techniques for Manipulating the Document Object Model (DOM)
Computer History - The Role of the Commodore 64 in the Home Computing Market
Advanced Malware Analysis - Static Analysis Techniques
Red Teaming - Physical Security Bypass Techniques
Advanced Cloud Security - Serverless Security and Misconfiguration
Python - Object-Oriented Programming in Python: Advanced Concepts and Techniques
Computer History - Computing in the 1980s: The Development of the Apple Macintosh
Malware Obfuscation - Techniques and Best Practices
Cybersecurity Frameworks - NIST, ISO, and CIS
Wireless Security - Best Practices and Common Attacks
Metaprogramming in Ruby: Techniques for Writing Code that Writes Code
History - Computing in the 1990s: The Emergence of Linux and Open-Source Software
Advanced Threat Hunting Techniques - TTP Analysis
Red Teaming - Scenario-Based Testing
Advanced Malware Analysis - Disassembly Techniques
Lua Programming Language - Basic Concepts and Syntax
Computer History - The Birth of the Intel x86 Architecture
Industrial Control System (ICS) Security - Best Practices and Common Vulnerabilities
Advanced Network Security - Application Layer Firewalls
Red Team Operations - Covert Channels and Exfiltration Techniques
PowerShell Scripting - Basic Concepts and Syntax
Computer History - The History of Apple Computers
Cyber Threat Intelligence - Best Practices and Techniques
Advanced Exploit Development - Heap Spraying Techniques
Blue Team Exercises - Threat Hunting and Incident Response
C++ Programming Language - Basic Concepts and Syntax
Computer History - The History of IBM and the Clone Wars
Advanced Memory Forensics - Analysis Techniques
Web Application Security - CSRF and XSS Prevention
BloodHound: Analyzing Active Directory for Security Risks and Attack Paths
Advanced Red Team Exercises - Supply Chain Attacks
Kotlin Programming Language - Basic Concepts and Syntax
Computer History - The Dot-Com Bubble
IoT Security - Best Practices and Common Vulnerabilities
Advanced Network Security - Intrusion Prevention Systems (IPS)
Mythic: An Introduction to the Open Source Post-Exploitation Framework
Cloud Security - Best Practices and Common Vulnerabilities
C Programming Language - Basic Concepts and Syntax
Computer History - The History of Email
Exploit Development - Introduction and Techniques
Advanced Social Engineering Techniques - Spear Phishing and Whaling
SharpSocks: A .NET-Based Proxy for Red Teaming and Network Penetration Testing
Red Team Exercises - Simulating Real-World Attacks
Swift Programming Language - Basic Concepts and Syntax
Computer History - The Evolution of Video Games
Advanced Malware Analysis - Dynamic Analysis Techniques
Physical Security Testing - Techniques and Best Practices
Covenant: Command and Control for Red Teaming and Post-Exploitation Operations
Hacking IoT Devices - Techniques and Real-World Examples
Java Programming Language - Basic Concepts and Syntax
Computer History - The Birth of the Internet
Ransomware - Analysis and Prevention
Firewall Bypass Techniques - Tools and Best Practices
Nishang: PowerShell Scripts for Penetration Testing and Red Teaming
Advanced Web Application Attacks - CSRF and XXE
Go Programming Language - Basic Concepts and Syntax
Computer History - The Evolution of Computer Graphics
Memory Forensics - Analysis and Techniques
Social Engineering - Pretexting Techniques
Empire: A Comprehensive Red Teaming Framework Built on PowerShell
Advanced Network Attacks - DDoS and Botnet Techniques
Python Programming Language - Basic Concepts and Syntax
Computer History - The Y2K Bug and its Impact on Technology
Malware Analysis - Introduction and Basic Concepts
Password Cracking Techniques - Tools and Best Practices
PowerSploit: Using PowerShell for Offensive Security Operations
Phishing Attacks - Detection and Prevention
Efficient Web Development with Rails - Best Practices and Tips
Computer History - The Rise and Fall of Netscape Navigator
Buffer Overflow Exploits - Introduction and Exploitation
Red Teaming - Basic Concepts and Frameworks
Metasploit Framework: An Overview of the Open Source Penetration Testing Tool
Social Engineering - Techniques and Real-World Examples
Nim Programming Language - Basic Concepts and Syntax
Computer History - The Origins and Evolution of Unix
Reverse Engineering - Introduction and Basic Concepts
Network Scanning and Enumeration - Tools and techniques
Cobalt Strike Community Edition: Getting Started with the Open Source Red Teaming Tool
Web Application Security - Advanced SQL Injection techniques
Rust Programming Language - Basic concepts and coding practices
Computer History - A Brief History of the Computer Mouse
Cross-Site Scripting (XSS) Attack - Understanding and exploiting
Introduction to Penetration Testing - Basic concepts and methodology
Understanding macOS’s Unix Underpinnings for Linux Red Team Members
Psexec for Remote Code Execution
Using sc.exe on Windows for Remote Execution
Microcode - The Lowest Layer of Software Stack
Using DSQuery for Red Team: A Guide to Gathering Information on Active Directory Environments
Powerful Windows Systems Administration Command-Line Tools for Advanced Red Team Members
Transferring Data from MySQL Database with Docker, Mysqldump, and Pgloader.
Chisel - Tunneling Traffic with SSH over HTTP
Using xfreerdp and Pass-the-Hash for RDP Connection
Tunneling Traffic through a Network: Techniques for Combining Iptables Port Bends, SSH Tunnels, and Netsh Port Proxies
How to Use Impacket Example Scripts to Access Microsoft SQL Server from Linux
Using Impacket to Access Windows Shares from Linux
Basic Introduction to smbclient
Efficient Remote File Transfers: Using SCP and SSH with a Master Control Socket
Ruby Programming Language - Basic concepts and coding practices
Disabling Command History in Linux Shells for Red Team Operations
Alternate Data Streams on Windows NTFS: A Red Team’s Guide to Hiding and Detecting Hidden Data
Port Scanning on Linux and Windows
Bash Scripting Language - Basic Concepts and Syntax
Computer History - The Rise and Fall of CP/M
Using WMIC for Red Teaming: A Guide for Pen Testers and Red Team Members
Initial Linux Enumeration - Best Practices and Techniques for Gathering Information about a Linux System