Robuta

https://academy.hackthebox.com/course/preview/dns-enumeration-using-python DNS Enumeration Using Python Course | HTB Academy As a penetration tester or red teamer, it is imperative that we understand the tools that we use inside and out and also have the ability to write out own, e... course htb academydnsusing https://academy.hackthebox.com/course/preview/mssql-exchange-and-sccm-attacks MSSQL, Exchange, and SCCM Attacks Course | HTB Academy This module covers attacks targeting tightly incorporated technologies in Active Directory environments such as MSSQL, Exchange, and SCCM, and how to identif... attacks course htbmssqlsccm https://academy.hackthebox.com/course/preview/intro-to-academys-purple-modules Intro to Academy's Purple Modules Course | HTB Academy course htbintroacademypurple https://academy.hackthebox.com/course/preview/server-side-attacks Server-side Attacks Course | HTB Academy A backend that handles user-supplied input insecurely can lead to devastating security vulnerabilities such as sensitive information disclosure and remote co... attacks course htbserver side Sponsored https://www.propertysex.com/ Property Sex: The Original and Best Real Estate Porn Site Property Sex.com brings you the hottest real estate porn on the Internet. Watch the hottest pornstars, ahem, I mean Real Estate Agents fuck for the sale! Or... https://academy.hackthebox.com/course/preview/active-directory-bloodhound Active Directory BloodHound Course | HTB Academy This module covers AD enumeration focusing on the BloodHound tool. We will cover various techniques for enumerating key AD objects that will inform our attac... course htb academyactive https://academy.hackthebox.com/course/preview/introduction-to-nosql-injection Introduction to NoSQL Injection Course | HTB Academy In this module, we will look at exploiting NoSQL injection vulnerabilities, specifically MongoDB, with examples in Python, PHP, and Node.JS. injection course htbnosql https://academy.hackthebox.com/course/preview/web-service--api-attacks Web Service & API Attacks Course | HTB Academy Web services and APIs are frequently exposed to provide certain functionalities in a programmatic way between heterogeneous devices and software components.... api attacks courseweb service https://academy.hackthebox.com/course/preview/stack-based-buffer-overflows-on-linux-x86 Stack-Based Buffer Overflows on Linux x86 Course | HTB Academy Buffer overflows are common vulnerabilities in software applications that can be exploited to achieve remote code execution (RCE) or perform a Denial-of-Serv... stack based buffercourse htb https://academy.hackthebox.com/course/preview/ai-evasion---foundations AI Evasion - Foundations Course | HTB Academy This module explores the foundations of inference‑time evasion attacks against AI models, showing how to manipulate inputs to bypass classifiers and force... foundations course htbai https://academy.hackthebox.com/course/preview/injection-attacks Injection Attacks Course | HTB Academy This module covers three injection attacks: XPath injection, LDAP injection, and HTML injection in PDF generation libraries. While XPath and LDAP injection v... injection attacks coursehtb https://academy.hackthebox.com/course/preview/password-attacks Password Attacks Course | HTB Academy Passwords are still the primary method of authentication in corporate networks. If strong password policies are not enforced, users often choose weak, easy-t... attacks course htbpassword https://academy.hackthebox.com/course/preview/android-penetration-testing-automation Android Penetration Testing Automation Course | HTB Academy course htb academyandroid https://academy.hackthebox.com/course/preview/macos-fundamentals MacOS Fundamentals Course | HTB Academy This module covers the fundamentals required to work comfortably within the macOS operating system and shell. fundamentals course htbmacos https://academy.hackthebox.com/course/preview/attacking-ai---application-and-system Attacking AI - Application and System Course | HTB Academy In this module, we will explore security vulnerabilities in the application and system components of AI deployments. We will also discuss the Model Context P... course htb academyattackingai Sponsored https://www.vixen.com/ VIXEN: Exclusive 4K Videos with the World’s Most Beautiful Women Watch the most beautiful women in the world brought to life through cinematic visuals, passionate storytelling, and premium-quality scenes... https://academy.hackthebox.com/course/preview/game-reversing--modding Game Reversing & Modding Course | HTB Academy This module serves as a follow-up to the Game Hacking Fundamentals module. You will learn how to persist Cheat Engine Scripts by scanning for byte arrays, ed... course htb academygameamp https://academy.hackthebox.com/course/preview/android-forensics Android Forensics Course | HTB Academy The Android Forensics module teaches students evidence recovery, system investigation, and data analysis on Android devices. It covers rooting, secure root a... forensics course htbandroid https://academy.hackthebox.com/course/preview/windows-api-monitoring-and-hooking Windows API Monitoring and Hooking Course | HTB Academy This module introduces the monitoring and hooking techniques for Windows APIs. These techniques are used in debugging, reverse engineering, malware analysis,... course htb academywindows api https://academy.hackthebox.com/course/preview/advanced-sql-injections Advanced SQL Injections Course | HTB Academy This module covers advanced SQL injection techniques with a focus on white-box testing, Java/Spring and PostgreSQL. injections course htbadvanced https://academy.hackthebox.com/course/preview/pivoting-tunneling-and-port-forwarding Pivoting, Tunneling, and Port Forwarding Course | HTB Academy Once a foothold is gained during an assessment, it may be in scope to move laterally and vertically within a target network. Using one compromised machine to... course htb academypivoting https://academy.hackthebox.com/course/preview/setting-up Setting Up Course | HTB Academy This module covers topics that will help us be better prepared before conducting penetration tests. Preparations before a penetration test can often take a l... course htb academysetting Sponsored https://sinparty.com/ SinParty | Freemium Adult Live Cams & Private Sex Shows Explore Live Adult Cams on SinParty. ❤️ 1000+ Real Models Streaming Naked. No Signup. Free to Watch. Start Watching Now! https://academy.hackthebox.com/course/preview/ntlm-relay-attacks NTLM Relay Attacks Course | HTB Academy attacks course htbntlm relay Sponsored https://www.livesex.com/ Live Sex and Live Porn Streaming on Free Live Sex Cams | livesex.com Enjoy live porn and chat with girls and boys. Watch steaming hot shows in free live sex chat rooms. Hundreds of models online right now on LiveSex.com. https://academy.hackthebox.com/course/preview/login-brute-forcing Login Brute Forcing Course | HTB Academy The module contains an exploration of brute-forcing techniques, including the use of tools like Hydra and Medusa, and the importance of strong password pract... course htb academyloginbrute https://academy.hackthebox.com/course/preview/yara--sigma-for-soc-analysts YARA & Sigma for SOC Analysts Course | HTB Academy This Hack The Box Academy module covers how to create YARA rules both manually and automatically and apply them to hunt threats on disk, live processes, memo... course htb academyyaraampsoc https://academy.hackthebox.com/course/preview/user-behavior-forensics User Behavior Forensics Course | HTB Academy This module covers the critical aspects of user behavior analysis by exploring Windows artifacts. It is specifically designed for digital forensic analysts,... forensics course htbuser https://academy.hackthebox.com/course/preview/ai-data-attacks AI Data Attacks Course | HTB Academy This module explores the intersection of Data and Artificial Intelligence, exposing how vulnerabilities within AI data pipelines can be exploited, ultimately... attacks course htbai data https://academy.hackthebox.com/course/preview/using-crackmapexec Using CrackMapExec Course | HTB Academy Active Directory presents a vast attack surface and often requires us to use many different tools during an assessment. The CrackMapExec tool, known as a... course htb academyusing https://academy.hackthebox.com/course/preview/attacking-common-services Attacking Common Services Course | HTB Academy Organizations regularly use a standard set of services for different purposes. It is vital to conduct penetration testing activities on each service internal... course htb academyattacking https://academy.hackthebox.com/course/preview/command-injections Command Injections Course | HTB Academy Command injection vulnerabilities can be leveraged to compromise a hosting server and its entire network. This module will teach you how to identify and expl... injections course htbcommand https://academy.hackthebox.com/course/preview/javascript-deobfuscation JavaScript Deobfuscation Course | HTB Academy This module will take you step-by-step through the fundamentals of JavaScript Deobfuscation until you can deobfuscate basic JavaScript code and understand it... course htb academyjavascript https://academy.hackthebox.com/course/preview/game-hacking-fundamentals Game Hacking Fundamentals Course | HTB Academy This module serves as an introduction to fundamental Game Hacking concepts. You will learn how to find and change memory values in a running game as well as... fundamentals course htbgame https://academy.hackthebox.com/course/preview/windows-low-level-detectability Windows Low Level Detectability Course | HTB Academy This module introduces user-mode threat detection on Windows, focusing on low-level techniques and dynamic analysis. It covers the Win32 API, Windows Interna... course htb academylow level https://academy.hackthebox.com/course/preview/supply-chain-attacks Supply Chain Attacks Course | HTB Academy This module provides a detailed overview of Supply Chain Attacks, covering hardware and software aspects. It explores the impact of supply chains, the lifecy... supply chain attackscoursehtb https://academy.hackthebox.com/course/preview/attacking-web-applications-with-ffuf Attacking Web Applications with Ffuf Course | HTB Academy This module covers the fundamental enumeration skills of web fuzzing and directory brute forcing using the Ffuf tool. The techniques learned in this module w... course htb academyattacking https://academy.hackthebox.com/course/preview/advanced-deserialization-attacks Advanced Deserialization Attacks Course | HTB Academy This module focuses on developing custom exploits for .NET deserialization vulnerabilities from a whitebox perspective. attacks course htbadvanced https://academy.hackthebox.com/course/preview/introduction-to-information-security Introduction to Information Security Course | HTB Academy This theoretical module provides a comprehensive introduction to the foundational components of information security, focusing on the structure and operation... course htb academyinformation https://academy.hackthebox.com/course/preview/linux-privilege-escalation Linux Privilege Escalation Course | HTB Academy Privilege escalation is a crucial phase during any security assessment. During this phase, we attempt to gain access to additional users, hosts, and resource... privilege escalation course https://academy.hackthebox.com/course/preview/wi-fi-password-cracking-techniques Wi-Fi Password Cracking Techniques Course | HTB Academy Password cracking is a cornerstone of wireless penetration testing, as many real-world assessments hinge on the strength of the Wi-Fi password and our abilit... wi fi passwordcourse htb https://academy.hackthebox.com/course/preview/intro-to-c2-operations-with-sliver Intro to C2 Operations with Sliver Course | HTB Academy Active Directory is present in over 90% of corporate environments and it is the prime target for attacks. This module covers the attack chain from getting th... course htb academyintrosliver https://academy.hackthebox.com/course/preview/detecting-access-token-manipulation-attacks Detecting Access Token Manipulation Attacks Course | HTB Academy This module focuses on Windows privilege escalation techniques through access token manipulation. It covers various topics, including Windows processes, acce... access token manipulationhtb https://academy.hackthebox.com/course/preview/file-inclusion File Inclusion Course | HTB Academy course htb academyfile https://academy.hackthebox.com/course/preview/whitebox-attacks Whitebox Attacks Course | HTB Academy attacks course htbwhitebox https://academy.hackthebox.com/course/preview/windows-fundamentals Windows Fundamentals Course | HTB Academy This module covers the fundamentals required to work comfortably with the Windows operating system. fundamentals course htb https://academy.hackthebox.com/course/preview/understanding-log-sources--investigating-with-splunk Understanding Log Sources & Investigating with Splunk Course | HTB Academy This module provides a comprehensive introduction to Splunk, focusing on its architecture and the creation of effective detection-related SPL (Search Process... splunk course htblogsources https://academy.hackthebox.com/course/preview/attacking-graphql Attacking GraphQL Course | HTB Academy GraphQL is a query language for APIs as an alternative to REST APIs. Clients are able to request data through GraphQL queries. If improperly configured or im... course htb academyattacking https://academy.hackthebox.com/course/preview/wi-fi-penetration-testing-tools-and-techniques Wi-Fi Penetration Testing Tools and Techniques Course | HTB Academy Wireless network penetration testing presents a unique challenge due to the wide variety of technologies, protocols, and security configurations encountered... wi fi penetrationcourse htb https://academy.hackthebox.com/course/preview/intermediate-network-traffic-analysis Intermediate Network Traffic Analysis Course | HTB Academy Through network traffic analysis, this module sharpens skills in detecting link layer attacks such as ARP anomalies and rogue access points, identifying netw... traffic analysis coursehtb https://academy.hackthebox.com/course/preview/network-enumeration-with-nmap Network Enumeration with Nmap Course | HTB Academy Nmap is one of the most used networking mapping and discovery tools because of its accurate results and efficiency. The tool is widely used by both offensive... course htb academynetworknmap Sponsored https://www.fanvue.com/isla-king Isla King - Fanvue Hi I'm Isla! After way too much overthinking (and a million should I really do this moments), I finally took the leap. I'm just a girl who's never... https://academy.hackthebox.com/course/preview/getting-started Getting Started Course | HTB Academy This module covers the fundamentals of penetration testing and an introduction to Hack The Box. course htb academygetting Sponsored https://www.fetishfix.com/ FetishFix.com - The World`s #1 Most Visited Video Chat Community FetishFix.com | The World`s #1 Most Visited Video Chat Community - Free Live Sex Video Chat https://academy.hackthebox.com/course/preview/http-attacks HTTP Attacks Course | HTB Academy This module covers three HTTP vulnerabilities: CRLF Injection, HTTP Request Smuggling, and HTTP/2 Downgrading. These vulnerabilities can arise on the HTTP le... attacks course htbhttpacademy https://academy.hackthebox.com/course/preview/attacking-wi-fi-protected-setup-wps Attacking Wi-Fi Protected Setup (WPS) Course | HTB Academy In this module, we delve into the intricacies of WPS, uncovering the common vulnerabilities that plague this technology. From brute-force attacks to more sop... wi fi protectedcourse htbwps Sponsored https://www.mydirtyhobby.de/ MyDirtyHobby | Live Sex Chat, Cam Girls, Amateur Sex Community https://academy.hackthebox.com/course/preview/android-application-malware-analysis Android Application Malware Analysis Course | HTB Academy This module offers a hands-on introduction to the world of Android malware analysis. It covers common malware types, the ways they abuse system permissions,... malware analysis coursehtb https://academy.hackthebox.com/course/preview/wired-equivalent-privacy-wep-attacks Wired Equivalent Privacy (WEP) Attacks Course | HTB Academy attacks course htbwiredwep https://academy.hackthebox.com/course/preview/wmi-tradecraft-analysis WMI Tradecraft Analysis Course | HTB Academy This module introduces WMI (Windows Management Instrumentation) based attack and analysis techniques, from both local and remote standpoints. WMI is a core W... analysis course htbwmiacademy Sponsored https://www.flirt4free.com/ Free Live Sex Cams and Adult Chat | Flirt4Free https://academy.hackthebox.com/course/preview/detection--opsec-cyber-range Detection & OpSec Cyber Range Course | HTB Academy course htb academycyber range https://academy.hackthebox.com/course/preview/httpstls-attacks HTTPs/TLS Attacks Course | HTB Academy This module covers details on Transport Layer Security (TLS) and how it helps to make HTTP secure with the widely used HTTPS. That includes how TLS works, ho... attacks course htbhttpstls https://academy.hackthebox.com/course/preview/llm-output-attacks LLM Output Attacks Course | HTB Academy In this module, we will explore different LLM output vulnerabilities resulting from improper handling of LLM outputs and insecure LLM applications. We will a... attacks course htbllm output https://academy.hackthebox.com/course/preview/process-injection-attacks-and-detection Process Injection Attacks and Detection Course | HTB Academy This module focuses on understanding the process injection techniques attackers use to execute malicious code within the context of legitimate processes. Thi... course htb academyprocess https://academy.hackthebox.com/course/preview/active-directory-powerview Active Directory PowerView Course | HTB Academy This module covers AD enumeration focusing on the PowerView and SharpView tools. We will cover various techniques for enumerating key AD objects that will in... course htb academyactive https://academy.hackthebox.com/course/preview/introduction-to-penetration-testing Introduction to Penetration Testing Course | HTB Academy In this module, we will get into the fundamentals of penetration testing, a critical aspect of cybersecurity theory that explains how professionals in the fi... penetration testing coursehtb Sponsored https://www.xlovecam.com/ Skinny Girls - Xlovecam Chat with hundreds of English and foreign Sexy WebCam Girls, Discover their Live Cam XXX Show for Free, Without Registration and in HD quality at XloveCam... https://academy.hackthebox.com/course/preview/attacking-common-applications Attacking Common Applications Course | HTB Academy Penetration Testers can come across various applications, such as Content Management Systems, custom web applications, internal portals used by developers an... applications course htbcommon https://academy.hackthebox.com/course/preview/session-security Session Security Course | HTB Academy course htb academysession https://academy.hackthebox.com/course/preview/android-application-dynamic-analysis Android Application Dynamic Analysis Course | HTB Academy This module focuses on the real-time analysis and manipulation of Android applications to uncover vulnerabilities that arise during execution. By examining h... analysis course htbandroid https://academy.hackthebox.com/course/preview/whitebox-pentesting-101-command-injection Whitebox Pentesting 101: Command Injection Course | HTB Academy This module focuses on discovering Command Injection vulnerabilities in NodeJS servers and exploiting them to control the server. injection course htbwhitebox https://academy.hackthebox.com/course/preview/footprinting Footprinting Course | HTB Academy This module covers techniques for footprinting the most commonly used services in almost all enterprise and business IT infrastructures. Footprinting is an e... course htb academy https://academy.hackthebox.com/course/preview/cross-site-scripting-xss Cross-Site Scripting (XSS) Course | HTB Academy Cross-Site Scripting (XSS) vulnerabilities are among the most common web application vulnerabilities. An XSS vulnerability may allow an attacker to execute a... course htb academycrosssite https://academy.hackthebox.com/course/preview/ai-evasion---sparsity-attacks AI Evasion - Sparsity Attacks Course | HTB Academy This module explores sparsity-constrained adversarial attacks that minimize the number of modified input features rather than perturbation magnitude, showing... attacks course htbaievasion https://academy.hackthebox.com/course/preview/parameter-logic-bugs Parameter Logic Bugs Course | HTB Academy course htb academyparameter https://academy.hackthebox.com/course/preview/cracking-passwords-with-hashcat Cracking Passwords with Hashcat Course | HTB Academy This module covers the fundamentals of password cracking using the Hashcat tool. course htb academycracking https://academy.hackthebox.com/course/preview/introduction-to-python-3 Introduction to Python 3 Course | HTB Academy Automating tedious or otherwise impossible tasks is highly valued during both penetration testing engagements and everyday life. Introduction to Python 3 aim... course htb academypython https://academy.hackthebox.com/course/preview/detecting-windows-attacks-with-splunk Detecting Windows Attacks with Splunk Course | HTB Academy This Hack The Box Academy module is focused on pinpointing attacks on Windows and Active Directory. Utilizing Splunk as the cornerstone for investigation, th... splunk course htbdetecting https://academy.hackthebox.com/course/preview/linux-process-injections--detections Linux Process Injections & Detections Course | HTB Academy This module introduces various Linux process injection techniques, from basic to advanced ones, from both local and remote standpoints. It focuses on how ELF... course htb academylinuxamp https://academy.hackthebox.com/course/preview/sql-injection-fundamentals SQL Injection Fundamentals Course | HTB Academy Databases are an important part of web application infrastructure and SQL (Structured Query Language) to store, retrieve, and manipulate information stored i... fundamentals course htbsql https://academy.hackthebox.com/course/preview/windows-lateral-movement Windows Lateral Movement Course | HTB Academy Windows lateral movement involves techniques to navigate and control remote systems within a network, primarily after gaining initial access. It is crucial i... course htb academywindows https://academy.hackthebox.com/course/preview/hacking-wordpress Hacking WordPress Course | HTB Academy WordPress is an open-source Content Management System (CMS) that can be used for multiple purposes. course htb academyhacking https://academy.hackthebox.com/course/preview/active-directory-ldap Active Directory LDAP Course | HTB Academy This module provides an overview of Active Directory (AD), introduces core AD enumeration concepts, and covers enumeration with built-in tools. active directory ldapcourse Sponsored https://sexmessenger.com/ Sex Messenger – Free Dating & Hookups Made Easy! It's never been this easy to meet hot girls online. SexMessenger.com dating software will forever change the way you hookup with beautiful girls on the web. https://academy.hackthebox.com/course/preview/introduction-to-linux-forensics Introduction to Linux Forensics Course | HTB Academy This module covers techniques for conducting digital forensics on Linux systems prevalent in enterprise servers and cloud infrastructures. Introduction to Li... forensics course htblinux https://academy.hackthebox.com/course/preview/fundamentals-of-ai Fundamentals of AI Course | HTB Academy This module provides a comprehensive guide to the theoretical foundations of Artificial Intelligence (AI). It covers various learning paradigms, including su... course htb academyai https://academy.hackthebox.com/course/preview/wi-fi-penetration-testing-basics Wi-Fi Penetration Testing Basics Course | HTB Academy wi fi penetrationcourse htb https://academy.hackthebox.com/course/preview/dacl-attacks-i DACL Attacks I Course | HTB Academy Discretionary Access Control Lists (DACLs), found within security descriptors, are a fundamental component of the security model of Windows and Active Direct... course htb academydaclattacks https://academy.hackthebox.com/course/preview/intro-to-network-traffic-analysis Intro to Network Traffic Analysis Course | HTB Academy Network traffic analysis is used by security teams to monitor network activity and look for anomalies that could indicate security and operational issues. O... traffic analysis courseintro https://academy.hackthebox.com/course/preview/dacl-attacks-ii DACL Attacks II Course | HTB Academy In this second module on Discretionary Access Control Lists (DACLs), we delve into sophisticated attack techniques and strategies within Windows Active Direc... course htb academydaclattacks https://academy.hackthebox.com/course/preview/introduction-to-windows-evasion-techniques Introduction to Windows Evasion Techniques Course | HTB Academy In this module we will cover the basics of evading antivirus solutions (Windows Defender specifically) from an attackers point-of-view. techniques course htbwindows https://academy.hackthebox.com/course/preview/active-directory-hardening---recon--initial-access Active Directory Hardening - Recon & Initial Access Course | HTB Academy Active Directory (AD) presents a vast attack surface and can be challenging to secure and control. Small changes can have a cascading effect, introducing fur... course htb academyactiverecon https://academy.hackthebox.com/course/preview/advanced-xss-and-csrf-exploitation Advanced XSS and CSRF Exploitation Course | HTB Academy Modern web browsers and applications utilize a variety of security measures to protect against CSRF and XSS vulnerabilities, rendering their exploitation mor... course htb academyadvancedxss https://academy.hackthebox.com/course/preview/introduction-to-deserialization-attacks Introduction to Deserialization Attacks Course | HTB Academy In this module, we will explore deserialization attacks with specific examples in Python and PHP. attacks course htbacademy https://academy.hackthebox.com/course/preview/ai-privacy AI Privacy Course | HTB Academy This module explores privacy attacks against machine learning models and the differential privacy defenses that protect models from such attacks. course htb academyaiprivacy https://academy.hackthebox.com/course/preview/using-web-proxies Using Web Proxies Course | HTB Academy Web application penetration testing frameworks are an essential part of any web penetration test. This module will teach you two of the best frameworks: Burp... course htb academyusing web https://academy.hackthebox.com/course/preview/working-with-idsips Working with IDS/IPS Course | HTB Academy course htb academyids ips https://academy.hackthebox.com/course/preview/active-directory-enumeration--attacks Active Directory Enumeration & Attacks Course | HTB Academy Active Directory (AD) is the leading enterprise domain management suite, providing identity and access management, centralized domain administration, authent... attacks course htbactiveamp https://academy.hackthebox.com/course/preview/introduction-to-binary-fuzzing Introduction to Binary Fuzzing Course | HTB Academy Fuzzing is a powerful software testing technique that deliberately introduces chaos into your applications. By bombarding your code with unexpected or malfor... fuzzing course htbbinary https://academy.hackthebox.com/course/preview/attacking-wpa3-wi-fi-networks Attacking WPA3 Wi-Fi Networks Course | HTB Academy Wi-Fi Protected Access 3 improves upon WPA2 by offering stronger encryption, SAE for personal networks, OWE for open networks, and mandatory Protected Mana... wi fi networkscourse htb https://academy.hackthebox.com/course/preview/introduction-to-malware-analysis Introduction to Malware Analysis Course | HTB Academy This module offers an exploration of malware analysis, specifically targeting Windows-based threats. The module covers Static Analysis utilizing Linux and Wi... malware analysis coursehtb https://academy.hackthebox.com/course/preview/documentation--reporting Documentation & Reporting Course | HTB Academy Proper documentation is paramount during any engagement. The end goal of a technical assessment is the report deliverable which will often be presented to a... reporting course htbamp https://academy.hackthebox.com/course/preview/brief-intro-to-hardware-attacks Brief Intro to Hardware Attacks Course | HTB Academy This mini-module concisely introduces hardware attacks, covering Bluetooth risks and attacks, Cryptanalysis Side-Channel Attacks, and vulnerabilities like Sp... attacks course htbbrief intro https://academy.hackthebox.com/course/preview/introduction-to-networking Introduction to Networking Course | HTB Academy As an information security professional, a firm grasp of networking fundamentals and the required components is necessary. Without a strong foundation in net... course htb academynetworking https://academy.hackthebox.com/course/preview/introduction-to-active-directory Introduction to Active Directory Course | HTB Academy Active Directory (AD) is present in the majority of corporate environments. Due to its many features and complexity, it presents a vast attack surface. To be... course htb academyactive https://academy.hackthebox.com/course/preview/information-gathering---web-edition Information Gathering - Web Edition Course | HTB Academy This module equips learners with essential web reconnaissance skills, crucial for ethical hacking and penetration testing. It explores both active and passiv... course htb academyinformation https://academy.hackthebox.com/course/preview/applications-of-ai-in-infosec Applications of AI in InfoSec Course | HTB Academy This module is a practical introduction to building AI models that can be applied to various infosec domains. It covers setting up a controlled AI environmen... course htb academyaiinfosec https://academy.hackthebox.com/course/preview/penetration-testing-process Penetration Testing Process Course | HTB Academy This module teaches the penetration testing process broken down into each stage and discussed in detail. We will cover many aspects of the role of a penetrat... process course htbpenetration https://academy.hackthebox.com/course/preview/windows-kernel-telemetry--detection-techniques Windows Kernel Telemetry & Detection Techniques Course | HTB Academy This module offers a deep dive into Windows kernel telemetry mechanisms from a defensive security perspective, covering a broad spectrum of telemetry sources... techniques course htbwindows