Courses

Cybersecurity Courses

Explore our comprehensive cybersecurity course library designed to accelerate your learning journey from beginner to expert. Master practical skills in penetration testing, SOC operations, offensive security and defensive security through hands-on learning.

17 of 33 courses
Nmap Essentials element

Nmap Essentials

Conduct network reconnaissance and mapping using Nmap.

Offensive|Beginner|
13h
Password Cracking Basics element

Password Cracking Basics

Learn practical cracking techniques and attack methodologies.

Offensive|Beginner|
14h
Network Service Enumeration element

Network Service Enumeration

Learn how to extract detailed information from network services.

Offensive|Beginner|
7h
Pentest Reporting and Documentation element

Pentest Reporting and Documentation

Communicate security findings effectively to technical and executive stakeholders.

Offensive|Beginner|
8h
Introduction to Penetration Testing element

Introduction to Penetration Testing

Discover what penetration testing is and explore different assessments.

Offensive|Beginner|
8h
Legalities and Ethics in Pentesting element

Legalities and Ethics in Pentesting

Stay on the right side of the law while conducting penetration tests.

Offensive|Beginner|
8h
New
Active Directory Enumeration element

Active Directory Enumeration

Enumerate Active Directory through LDAP, RPC, and native tools.

Offensive|Intermediate|
16h
New
Rubeus Tool Usage element

Rubeus Tool Usage

Kerberos abuse and AD attack operations with Rubeus.

Offensive|Intermediate|
8h
New
Impacket Tool Usage element

Impacket Tool Usage

Network protocol exploitation and AD security with Impacket.

Offensive|Intermediate|
14h
New
Kerberos Attack Techniques element

Kerberos Attack Techniques

Exploit Kerberos authentication for AD domain compromise.

Offensive|Intermediate|
16h
New
NetExec Tool Usage element

NetExec Tool Usage

Network service exploitation and AD assessment with NetExec.

Offensive|Intermediate|
10h
Metasploit Framework Essentials element

Metasploit Framework Essentials

Exploit vulnerabilities and conduct post-exploitation activities using Metasploit.

Offensive|Intermediate|
18h
Fundamental OSINT Techniques element

Fundamental OSINT Techniques

Learn how to gather intelligence from publicly available sources.

Offensive|Intermediate|
12h
DNS Enumeration and Subdomain Discovery element

DNS Enumeration and Subdomain Discovery

Uncover hidden assets and map attack surfaces through DNS recon.

Offensive|Intermediate|
8h
Ethical Hacking Methodology element

Ethical Hacking Methodology

Understand the methodology used by penetration testers.

Offensive|Intermediate|
16h
Brute Forcing Network Services element

Brute Forcing Network Services

Learn to test authentication security across network services.

Offensive|Intermediate|
17h
SQL Injection Attacks element

SQL Injection Attacks

Learn to find and exploit SQL injection vulnerabilities.

Offensive|Intermediate|
24h
In Development

Coming Soon

We're working on these exciting new courses, coming to the Academy soon.

OWASP Top 10 Exploitation

OWASP Top 10 Exploitation

Offensive|Beginner
Wi-Fi Penetration Testing

Wi-Fi Penetration Testing

Offensive|Intermediate