Cyber Security Courses


Learning Process
Learning Process

The learning process is one of the essential and most important components that is often overlooked. This module does not teach you techniques to lear...

Introduction to Academy
Introduction to Academy

This module is recommended for new users. It allows users to become acquainted with the platform and the learning process.

Hacking WordPress
Hacking WordPress

WordPress is an open-source Content Management System (CMS) that can be used for multiple purposes.

Linux Fundamentals
Linux Fundamentals

This module covers the fundamentals required to work comfortably with the Linux operating system and shell.

Network Enumeration with Nmap
Network Enumeration with Nmap

Nmap is one of the most used networking mapping and discovery tools because of its accurate results and efficiency. The tool is widely used by both of...

Cracking Passwords with Hashcat
Cracking Passwords with Hashcat

This module covers the fundamentals of password cracking using the Hashcat tool.

Active Directory LDAP
Active Directory LDAP

This module provides an overview of Active Directory (AD), introduces core AD enumeration concepts, and covers enumeration with built-in tools.

File Inclusion / Directory Traversal
File Inclusion / Directory Traversal

File Inclusion is a common web application vulnerability, which can be easily overlooked as part of a web application's functionality.

File Transfers
File Transfers

During an assessment, it is very common for us to transfer files to and from a target system. This module covers file transfer techniques leveraging t...

Stack-Based Buffer Overflows on Linux x86
Stack-Based Buffer Overflows on Linux x86

Buffer overflows are common vulnerabilities in software applications that can be exploited to achieve remote code execution (RCE) or perform a Denial-...

Web Requests
Web Requests

Web applications provide a large potential attack surface and need to be secured properly. A firm grasp of the basics of how applications communicate...

Secure Coding 101: JavaScript
Secure Coding 101: JavaScript

Learn how to improve your JavaScript code's security through Code Review, Static/Dynamic Analysis, Vulnerability Identification, and Patching.

JavaScript Deobfuscation
JavaScript Deobfuscation

This module will take you step-by-step through the fundamentals of JavaScript Deobfuscation until you can deobfuscate basic JavaScript code and unders...

Whitebox Pentesting 101: Command Injection
Whitebox Pentesting 101: Command Injection

This module focuses on discovering Command Injection vulnerabilities in NodeJS servers and exploiting them to control the server.

Windows Fundamentals
Windows Fundamentals

This module covers the fundamentals required to work comfortably with the Windows operating system.

Linux Privilege Escalation
Linux Privilege Escalation

Privilege escalation is a crucial phase during any security assessment. During this phase, we attempt to gain access to additional users, hosts, and r...

Attacking Web Applications with Ffuf
Attacking Web Applications with Ffuf

This module covers the fundamental enumeration skills of web fuzzing and directory brute, forcing using the Ffuf tool. The techniques learned in this...

Login Brute Forcing
Login Brute Forcing

Learn how to brute force logins for various types of services and create custom wordlists based on your target.

SQLMap Essentials
SQLMap Essentials

The SQLMap Essentials module will teach you the basics of using SQLMap to discover various types of SQL Injection vulnerabilities, all the way to the...

Active Directory PowerView
Active Directory PowerView

This module covers AD enumeration focusing on the PowerView and SharpView tools. We will cover various techniques for enumerating key AD objects that...

Active Directory BloodHound
Active Directory BloodHound

This module covers AD enumeration focusing on the BloodHound tool. We will cover various techniques for enumerating key AD objects that will inform ou...

Sign Up to get started!