Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Demonstra o processo de extração e quebra de hashes NTLM no Windows, além de cobrir o uso de hashes NTLM para ataques Pass-The-Hash em cenários de pós-exploração.
Demonstrating how to identify and exploit AutoRun programs in Windows Registry for privilege escalation, with practical examples and tools like winPEAS.
Explore the pros and cons of Parrot OS for penetration testing, including reasons for discontinuing its use and its current strengths and weaknesses in cybersecurity applications.
Exploración detallada de la vulnerabilidad Log4Shell en Log4J, demostrando técnicas de explotación y mitigación en Apache Solr. Incluye explicación del impacto y gravedad de esta falla crÃtica de seguridad.
Automate Windows local enumeration and identify privilege escalation vectors using winPEAS. Learn efficient techniques for system analysis and vulnerability detection.
Explore diverse cybersecurity paths, certifications, and skills needed for transitioning into a cybersecurity career. Gain insights into industry-recognized resources and career progression opportunities.
Explore Windows credential access techniques using Mimikatz and WCE to dump passwords and hashes from memory. Learn post-exploitation methods for red team operations and penetration testing.
Explore Windows Red Team persistence techniques using PowerShell Empire for maintaining access to targets. Learn about this post-exploitation framework and its features for bypassing protections.
Aprenda técnicas de exploração de equipe vermelha para identificar e explorar vulnerabilidades em servidores Linux com aplicações web, focando em WordPress e MySQL.
Explore Windows Red Team exploitation techniques for initial access, including creating malicious macro documents and setting up a C2 server with PowerShell Empire & Starkiller.
Explore active and passive reconnaissance techniques for Red Team operations, including information gathering on organizations, infrastructure, and personnel to support targeting and adversary lifecycle phases.
Explore automated Red Team adversary emulation using MITRE Caldera, a framework built on ATT&CK for simulating attacks and testing organizational security defenses.
Automate and visualize Active Directory enumeration using BloodHound. Learn to streamline the process of identifying vulnerabilities and attack paths in AD environments.
Learn to perform Active Directory enumeration using PowerView, a powerful tool for gathering information about network domains, users, and computers in penetration testing scenarios.
Learn manual local enumeration techniques for Windows targets using built-in commands to gather user, group, and system information, and identify active security features.
Get personalized course recommendations, track subjects and courses with reminders, and more.