Courses

Evading Microsoft Defender
In this hands-on lab, you will learn about evading Microsoft Defender. You will practice using process injection and obfuscation techniques to evade Microsoft Defender.

Tunneling and Pivoting
In this hands-on lab, you will learn about tunneling and pivoting as tactics for traversing target networks. You will practice tunneling and pivoting using Metasploit and SSH Dynamic Port Forwarding.

File Integrity Monitoring
In this hands-on lab, you will the basics of file integrity monitoring. You will practice implementing file integrity monitoring on Windows using both WinFM.NET and Wazuh.

Data Masking
In this hands-on lab, you will learn about data masking as a data obfuscation technique. You will practice using data masking tools to protect sensitive information by creating a copy of a production database and masking its data using DataVeil.

Secure Data Storage and Transmission
In this hands-on lab, you will learn about securing data at rest and in transit using encryption and other security measures. You will practice securing a MariaDB database and applying OpenSSH to RDP administration.

Configure Windows Defender on a Windows System
This IT Pro Challenge helps learners understand how Microsoft Windows Defender works. Participants will learn how to configure Windows Defender to create an exclusion, how to verify that exclusion, and how to work with Windows Defender to prevent the installation of malicious software.
