Highly practical IT Security training courses
Tailored to complete beginners, PTSv3 is the best first step towards becoming a Penetration Tester you can take. It covers Networking and Programming skills up to the most important basics of Penetration Testing.
Category: Penetration Testing, Hera
PTX is an online, self-paced training course that provides the knowledge and skills to execute state-sponsored-like operations, perform advanced adversary simulation and covers implementation details on numerous undocumented attacks plus much more. All Editions include lifetime access to the training material.
Category: Penetration Testing, Hera, eXtreme
Threat Hunting Professional (THP) is an online, self-paced training course that provides you with the knowledge and skills to proactively hunt for evil in your environment. THP will train you to develop a hunting mentality using different hunting strategies to hunt for various attack techniques and signatures. THP also comes with lifetime access to course materials and flexible access to the most sophisticated virtual labs on threat hunting.
Category: Threat Hunting, Threat Intelligence
MASPT covers everything you need to know to perform a security analysis on iOS and Android mobile applications. It provides must have skills for any modern Penetration Tester.
Category: Mobile Application Security, Penetration Testing
The WAPTx is a follow up of the WAPT course brought to an “extreme” level. This course throws students into a new world of advanced exploitation techniques using real-world scenarios.
Category: Web Application Security, Penetration Testing, Hera, eXtreme
Practical Network Defense is a practical course which covers the network and system security topics. The lessons include full practical setup guides and include a virtual lab in Hera for the student to practice their new skills before deploying these technologies and strategies in a production network.
Category:Network Security, Penetration Testing, Hera
This fundamental course teaches you the theoretical and practical knowledge required to perform advanced reverse engineering of software on assembly level in third party software and/or malware. Through a series of lessons, which also involve several challenges to be solved and to play with, you will be taught all the necessary skills to succeed as a professional reverse engineer
Category:Security, Reverse Engineering