Chapter 1. Course Introduction
Empower yourself with the essential skills to fortify digital architectures against contemporary and emerging threats.
Empower yourself with the essential skills to fortify digital architectures against contemporary and emerging threats.
Chapter 1. Course Introduction
Chapter 2. Introduction to Infrastructure & Ops Security
Chapter 3. Phases of Hacking
Chapter 4. Reconnaissance - The First Step of Hacking
Chapter 5. Scanning, Identifying Vulnerabilities, and Mapping the Network
Chapter 6. Gaining Access: The Art of Exploitation
Chapter 7. Mapping and Information Gathering
Chapter 8. Service Enumeration and Subdomain Takeover
Chapter 9. Default Pages, Backup Files, and Application Versions
Chapter 10. Command Injection Attacks
Chapter 11. Privilege Escalation - Linux
Chapter 12. Privilege Escalation - Windows
Chapter 13. Security, TLS, and Configuration
Chapter 14. Labs - Basic to Advanced