This course is designed for those who wish to learn how to penetrate a server (hacking) or tactics of attack in the cyber space.
In this course, participants will have understanding about OWASP TOP 10 and deep learning how to take advantage of SQL Injection …
Reverse Engineering Malware
This course is designed for those who wish to explore tools and techniques for in-depth malware analysis.
The Art of Windows Exploitation
This course is designed for security personnel whose job is to conduct penetration tests and …
The participant will learn how some of the most elegant social engineering attacks take place.
In this course, participants will learn how to use open-source tools to analyze an intrusion in the network.