
Courses

Password Cracking
In this hands-on lab, you will learn the basics of password cracking. You will practice using Hashcat to crack passwords using both brute force and dictionary-based techniques.

Metasploit Basics
In this hands-on lab, you will learn the basics of Metasploit, a popular penetration testing tool. You will practice using some core features of Metasploit to identify and exploit vulnerabilities on a live server.

Vulnerability Scanner Basics
In this hands-on lab, you will learn the basics of vulnerability scanners, including basic functionality and practical applications. You will practice configuring and analyzing scans using the OpenVAS vulnerability scanner.

Local Host Enumeration
In this hands-on lab, you will learn the basics of local host enumeration. You will practice enumerating a Linux system using built-in commands and a Windows system using the WinPEAS script.

Network Reconnaissance
In this lab, you will learn the basics of performing reconnaissance and enumeration on a target network. You will practice using Masscan and Nmap to scan and enumerate a network.

Nmap Basics
In this hands-on lab, you will learn the basics of Nmap, including basic functionality and practical applications. You will practice scanning and enumeration using a range of different Nmap options.

OSINT
In this hands-on lab, you will learn the basics of Open-Source Intelligence (OSINT). You will practice gathering publicly available information about a target organization's assets and people from a number of sources.

Data Loss Prevention
In this hands-on lab, you will learn the basics of Data Loss Prevention (DLP) solutions. You will practice using Windows utilities and a Wazuh SIEM/XDR solution to simulate several of the core features of DLP.

Data Classification
In this hands-on lab, you will learn the basics of data classification. You will practice discovering sensitive data using DataVeil and Data Hound. You will also practice tagging data using DataHub.

Database Security
This course covers the critical aspects of securing databases, including access control, encryption, and regular security assessments.
Security enthusiast and seasoned lab architect.