Learning Paths
Complete Beginner
- Complete Beginner Introduction
- Tutorial
- Starting Out In Cyber Sec
- Introductory Researching
- Linux Fundamentals
- Linux Fundamentals Part 1
- Linux Fundamentals Part 2
- Linux Fundamentals Part 3
- Network Exploitation Basics
- Introductory Networking
- Nmap
- Network Services
- Network Services 2
- Web Hacking Fundamentals
- How Websites Work
- HTTP in Detail
- Burp Suite: The Basics
- OWASP Top 10 – 2021
- OWASP Juice Shop
- Upload Vulnerabilities
- Pickle Rick
- Cryptography
- Hashing – Crypto 101
- John the Ripper: The Basics
- Encryption – Crypto 101
- Windows Exploitation Basics
- Windows Fundamentals 1
- Windows Fundamentals 2
- Active Directory Basics
- Metasploit: Introduction
- Metasploit: Exploitation
- Metasploit: Meterpreter
- Blue
- Shells and Privilege Escalation
- What the Shell?
- Common Linux Privesc
- Linux PrivEsc
- Basic Computer Exploitation
- Vulversity
- Basic Pentesting
- Kenobi
- Steel Mountain
Introduction to Cyber Security
- Introduction to Cyber Security
- Offensive Security Intro
- Defensive Security Intro
- Careers in Cyber
- Introduction to Offensive Security
- Web Application Security
- Operating System Security
- Network Security
- Introduction to Defensive Security
- Intro to Digital Forensics
- Security Operations
Cyber Defense
- Cyber Defense Introduction
- Tutorial
- Introductory Networking
- Network Services
- Network Services 2
- Wireshark 101
- Windows Fundamentals 1
- Active Directory Basics
- Threat And Vulnerability Management
- Nessus
- MITRE
- Yara
- Zero Logon
- OpenVAS
- MISP
- Security Operations & Monitoring
- Core Windows Processes
- Sysinternals
- Windows Event Logs
- Sysmon
- Osquery: The Basics
- Splubnk: Basics
- Splunk 2
- Threat Emulation
- Attacktive Directory
- Attacking Kerberos
- Incident Response and Forensics
- Volatility
- Investigating Windows
- Windows Forensics 1
- Windows Forensics 2
- Redline
- Autopsy
- Disk Analysis & Autopsy
- Malware Analysis
- History of Malware
- MAL: Malware Introductory
- MAL: Strings
- Basic Malware RE
- MAL:REMnux – The Redux
CompTIA Pentest+
- Planning and Scoping
- Pentesting Fundamentals
- RedTeam Engagements
- Governance & Regulation
- Tools And Code Analysis
- Metasploit: Introduction
- Wireshark: The Basics
- Burp Suite: The Basics
- Hydra
- Python Basics
- Python for Pentesters
- Information Gathering and Vulnerability Scanning
- Passive Reconnaissance
- Active Reconnaissance
- Nmap Live Host Discovery
- Nmap Basic Port Scans
- Nmap Advanced Port Scans
- Attacks and Exploits
- HTTP in Detail
- OWASP Top 10 – 2021
- OWASP Juice Shop
- Phishing
- Windows Privilege Escalation
- Windows Local Persistence
- Active Directory Basics
- Breaching Active Directory
- Linux Privilege Escalation
- Lateral Movement and Pivoting
- Persisting Active Directory
- Credential Harvesting
Offensive Pentesting
- Getting Started
- Tutorial
- Vulnversity
- Blue
- Kenobi
- Advanced Exploitation
- Steel Mountain
- Alfred
- HackPark
- Game Zone
- Skynet
- Dailyu Bugle
- Overpass 2- Hacked
- Relavant
- Internal
- Buffer Overflow Exploitation
- Buffer Overflow Prep
- Brainstorm
- Gatekeeper
- Brainpan 1
- Active Directory
- Active Directory Basics
- Breaching active Directory
- Enumeration Active Directory
- Lateral Movement and Pivoting
- Exploiting Active Directory
- Persisting Active Directory
- Credentials Harvesting
- Extra Credit
- Hacking with PowerShell
- Corp
- Mr Robot CTF
- Retro