
Courses

Network Device Basics
In this hands-on lab, you will learn the basics of network devices. You will practice assessing and configuring a simple network topology in the GNS3 network simulator.

IP Addressing Basics
In this hands-on lab, you will learn the basics of IP addressing. You will practice analyzing a TCP/IP network topology in the GNS3 network simulator using basic Linux commands.

Linux File System Basics
In this hands-on lab, you will learn the basics of the Linux file system. You will practice using the Linux CLI to navigate the Linux file system and explore important directories.

Password Spraying and Credential Stuffing
In this hands-on lab, you will learn about password spraying and credential stuffing. You will practice using Hydra and Burp Suite to perform password spraying and credential stuffing attacks.

Application Attacks Basics
In this course, you will learn the basics of applications and how to attack them, including web application architecture, common vulnerablities, and mitigation strategies.

Evading Microsoft Defender
In this hands-on lab, you will learn about evading Microsoft Defender. You will practice using process injection and obfuscation techniques to evade Microsoft Defender.

Tunneling and Pivoting
In this hands-on lab, you will learn about tunneling and pivoting as tactics for traversing target networks. You will practice tunneling and pivoting using Metasploit and SSH Dynamic Port Forwarding.

File Integrity Monitoring
In this hands-on lab, you will the basics of file integrity monitoring. You will practice implementing file integrity monitoring on Windows using both WinFM.NET and Wazuh.

Data Masking
In this hands-on lab, you will learn about data masking as a data obfuscation technique. You will practice using data masking tools to protect sensitive information by creating a copy of a production database and masking its data using DataVeil.

Secure Data Storage and Transmission
In this hands-on lab, you will learn about securing data at rest and in transit using encryption and other security measures. You will practice securing a MariaDB database and applying OpenSSH to RDP administration.

Configure Windows Defender on a Windows System
This IT Pro Challenge helps learners understand how Microsoft Windows Defender works. Participants will learn how to configure Windows Defender to create an exclusion, how to verify that exclusion, and how to work with Windows Defender to prevent the installation of malicious software.