- Windows Exploitation Basics
- Metasploit
- Introduction to Pentesting
- Network Exploitation Basics
- Cryptography
- Security Operations & Monitoring
- Threat Emulation
- How The Web Works
- Malware Analysis
- Network Fundamentals
- Basic Computer Exploitation
- Phishing
- Incident Response and Forensics
- Windows Fundamentals
- Burp Suite
- Linux Fundamentals
- Web Hacking Fundamentals
- Privilege Escalation
- Shell and Privilege Escalation
- Vulnerability Research
- Network Security
- Threat and Vulnerability Management
- Scripting for Penetesters
- Introduction to Web Hacking
- Nmap
- Inintial Access
- cyber Security Awareness
- Red Team Fundamentals
- Network Security Evasion
- Introduction to Offensive Security
- Introduction to Defensive Security
- Introduction to cyber Security
- Recent Threats
- Compromising Active Directory
- Post Compromise
- Host Evasions
- Cyber Defence Frameworks
- Cyber Threat Intelligence
- Network Security and Traffic Analysis
- Digital Forensics and Incident Response
- Wireshark
- Snort
- Security Information and Event Management
- Endpoint Security Monitoring
- Introduction to AWS
- Attacking and Defending Core Services
- IAM Privilege Escalation
- Introduction to IAM
- Attacking and Defending Serverless
- Detection Engineering
- Software Security
- Tools and Code Analysis
- Planning and Scoping
- Information Gathering and Vulnerability Scanning
- Attacks and Exploits
- Introduction to Security Engineering
- Threats and Risks
- Network ands System Security
- Managing Incidents
- Log Analysis
- Advanced Splunk
- Advanced ELK
- Threat Hunting
- Threat Emulation
- Incident Response
- Malware Analysis
- Secure Software Development
- AoC 2023 Side Quest
- Security of the Pipeline
- Security in the Pipeline
- Infrastructure as Code
- Container Security
- HTTP Request Smuggling
- TryHack3M Special
- Advanced Client-Side Attacks
- Advanced Server-Side Attacks
- Snyk
- SOC Level 1 Capstone Challenges
- Injection Attacks
- Windows Endpoint Investigation
- Kubernetes Hardening
- Authentication
- Start Your Cyber Security Journey
- Exploitation Basics
- Web Hacking
- Offensive Security Tooling
- Security Solutions
- Build Your Cyber Security Career
- Command Line
- Networking
- Cryptography
- Defensive Security
- Defensive Security Tooling
- Linux Endpoint Investigation
- Windows and AD Fundamentals
- Wonderland
- Overpass
- New Year
- Starters
- Investigating Windows
- Pentesting Tools
- WindCorp
- Breaking Windows
- DFIR Essentials