Sponsored https://www.sakuralive.com/
Japanese Webcam | Chat with Sexy Japanese Cam Girls Online
Video Chat with Sexy Japanese Webcam Girls Online right now. With over 22k+ plus registered performers, you are sure to find one that you'll like. Don't wait,...
https://academy.hackthebox.com/course/preview/dns-enumeration-using-python
DNS Enumeration Using Python Course | HTB Academy
As a penetration tester or red teamer, it is imperative that we understand the tools that we use inside and out and also have the ability to write out own, e...
course htb academydnsusing
https://academy.hackthebox.com/course/preview/mssql-exchange-and-sccm-attacks
MSSQL, Exchange, and SCCM Attacks Course | HTB Academy
This module covers attacks targeting tightly incorporated technologies in Active Directory environments such as MSSQL, Exchange, and SCCM, and how to identif...
attacks course htbmssqlsccm
Sponsored https://rencontredouce.com/
RencontreDouce
Less swiping. More actually meeting.
https://academy.hackthebox.com/course/preview/intro-to-academys-purple-modules
Intro to Academy's Purple Modules Course | HTB Academy
course htbintroacademypurple
https://academy.hackthebox.com/course/preview/server-side-attacks
Server-side Attacks Course | HTB Academy
A backend that handles user-supplied input insecurely can lead to devastating security vulnerabilities such as sensitive information disclosure and remote co...
attacks course htbserver side
https://academy.hackthebox.com/course/preview/active-directory-bloodhound
Active Directory BloodHound Course | HTB Academy
This module covers AD enumeration focusing on the BloodHound tool. We will cover various techniques for enumerating key AD objects that will inform our attac...
course htb academyactive
https://academy.hackthebox.com/course/preview/introduction-to-nosql-injection
Introduction to NoSQL Injection Course | HTB Academy
In this module, we will look at exploiting NoSQL injection vulnerabilities, specifically MongoDB, with examples in Python, PHP, and Node.JS.
injection course htbnosql
https://academy.hackthebox.com/course/preview/web-service--api-attacks
Web Service & API Attacks Course | HTB Academy
Web services and APIs are frequently exposed to provide certain functionalities in a programmatic way between heterogeneous devices and software components....
api attacks courseweb service
Sponsored https://chaturbate.com/
Chaturbate: Free Adult Webcams, Live Sex, Free Sex Chat, Exhibitionist and Pornstar Free Cams
https://academy.hackthebox.com/course/preview/stack-based-buffer-overflows-on-linux-x86
Stack-Based Buffer Overflows on Linux x86 Course | HTB Academy
Buffer overflows are common vulnerabilities in software applications that can be exploited to achieve remote code execution (RCE) or perform a Denial-of-Serv...
stack based buffercourse htb
https://academy.hackthebox.com/course/preview/ai-evasion---foundations
AI Evasion - Foundations Course | HTB Academy
This module explores the foundations of inference‑time evasion attacks against AI models, showing how to manipulate inputs to bypass classifiers and force...
foundations course htbai
https://academy.hackthebox.com/course/preview/injection-attacks
Injection Attacks Course | HTB Academy
This module covers three injection attacks: XPath injection, LDAP injection, and HTML injection in PDF generation libraries. While XPath and LDAP injection v...
injection attacks coursehtb
https://academy.hackthebox.com/course/preview/password-attacks
Password Attacks Course | HTB Academy
Passwords are still the primary method of authentication in corporate networks. If strong password policies are not enforced, users often choose weak, easy-t...
attacks course htbpassword
https://academy.hackthebox.com/course/preview/android-penetration-testing-automation
Android Penetration Testing Automation Course | HTB Academy
course htb academyandroid
https://academy.hackthebox.com/course/preview/macos-fundamentals
MacOS Fundamentals Course | HTB Academy
This module covers the fundamentals required to work comfortably within the macOS operating system and shell.
fundamentals course htbmacos
https://academy.hackthebox.com/course/preview/attacking-ai---application-and-system
Attacking AI - Application and System Course | HTB Academy
In this module, we will explore security vulnerabilities in the application and system components of AI deployments. We will also discuss the Model Context P...
course htb academyattackingai
https://academy.hackthebox.com/course/preview/game-reversing--modding
Game Reversing & Modding Course | HTB Academy
This module serves as a follow-up to the Game Hacking Fundamentals module. You will learn how to persist Cheat Engine Scripts by scanning for byte arrays, ed...
course htb academygameamp
https://academy.hackthebox.com/course/preview/android-forensics
Android Forensics Course | HTB Academy
The Android Forensics module teaches students evidence recovery, system investigation, and data analysis on Android devices. It covers rooting, secure root a...
forensics course htbandroid
https://academy.hackthebox.com/course/preview/windows-api-monitoring-and-hooking
Windows API Monitoring and Hooking Course | HTB Academy
This module introduces the monitoring and hooking techniques for Windows APIs. These techniques are used in debugging, reverse engineering, malware analysis,...
course htb academywindows api
https://academy.hackthebox.com/course/preview/advanced-sql-injections
Advanced SQL Injections Course | HTB Academy
This module covers advanced SQL injection techniques with a focus on white-box testing, Java/Spring and PostgreSQL.
injections course htbadvanced
https://academy.hackthebox.com/course/preview/pivoting-tunneling-and-port-forwarding
Pivoting, Tunneling, and Port Forwarding Course | HTB Academy
Once a foothold is gained during an assessment, it may be in scope to move laterally and vertically within a target network. Using one compromised machine to...
course htb academypivoting
https://academy.hackthebox.com/course/preview/setting-up
Setting Up Course | HTB Academy
This module covers topics that will help us be better prepared before conducting penetration tests. Preparations before a penetration test can often take a l...
course htb academysetting
https://academy.hackthebox.com/course/preview/ntlm-relay-attacks
NTLM Relay Attacks Course | HTB Academy
attacks course htbntlm relay
https://academy.hackthebox.com/course/preview/login-brute-forcing
Login Brute Forcing Course | HTB Academy
The module contains an exploration of brute-forcing techniques, including the use of tools like Hydra and Medusa, and the importance of strong password pract...
course htb academyloginbrute
https://academy.hackthebox.com/course/preview/yara--sigma-for-soc-analysts
YARA & Sigma for SOC Analysts Course | HTB Academy
This Hack The Box Academy module covers how to create YARA rules both manually and automatically and apply them to hunt threats on disk, live processes, memo...
course htb academyyaraampsoc
https://academy.hackthebox.com/course/preview/user-behavior-forensics
User Behavior Forensics Course | HTB Academy
This module covers the critical aspects of user behavior analysis by exploring Windows artifacts. It is specifically designed for digital forensic analysts,...
forensics course htbuser
https://academy.hackthebox.com/course/preview/ai-data-attacks
AI Data Attacks Course | HTB Academy
This module explores the intersection of Data and Artificial Intelligence, exposing how vulnerabilities within AI data pipelines can be exploited, ultimately...
attacks course htbai data
Sponsored https://fantasy.ai/
Create, Chat, and Connect with Your Perfect AI Companion - Fantasy.ai
Upgrade your Fantasy with a next-level AI Companion Platform. Create, Chat, and Connect. Your Fantasy, your Way!
https://academy.hackthebox.com/course/preview/using-crackmapexec
Using CrackMapExec Course | HTB Academy
Active Directory presents a vast attack surface and often requires us to use many different tools during an assessment. The CrackMapExec tool, known as a...
course htb academyusing
https://academy.hackthebox.com/course/preview/attacking-common-services
Attacking Common Services Course | HTB Academy
Organizations regularly use a standard set of services for different purposes. It is vital to conduct penetration testing activities on each service internal...
course htb academyattacking
https://academy.hackthebox.com/course/preview/command-injections
Command Injections Course | HTB Academy
Command injection vulnerabilities can be leveraged to compromise a hosting server and its entire network. This module will teach you how to identify and expl...
injections course htbcommand
https://academy.hackthebox.com/course/preview/javascript-deobfuscation
JavaScript Deobfuscation Course | HTB Academy
This module will take you step-by-step through the fundamentals of JavaScript Deobfuscation until you can deobfuscate basic JavaScript code and understand it...
course htb academyjavascript
https://academy.hackthebox.com/course/preview/game-hacking-fundamentals
Game Hacking Fundamentals Course | HTB Academy
This module serves as an introduction to fundamental Game Hacking concepts. You will learn how to find and change memory values in a running game as well as...
fundamentals course htbgame
https://academy.hackthebox.com/course/preview/windows-low-level-detectability
Windows Low Level Detectability Course | HTB Academy
This module introduces user-mode threat detection on Windows, focusing on low-level techniques and dynamic analysis. It covers the Win32 API, Windows Interna...
course htb academylow level
https://academy.hackthebox.com/course/preview/supply-chain-attacks
Supply Chain Attacks Course | HTB Academy
This module provides a detailed overview of Supply Chain Attacks, covering hardware and software aspects. It explores the impact of supply chains, the lifecy...
supply chain attackscoursehtb
https://academy.hackthebox.com/course/preview/attacking-web-applications-with-ffuf
Attacking Web Applications with Ffuf Course | HTB Academy
This module covers the fundamental enumeration skills of web fuzzing and directory brute forcing using the Ffuf tool. The techniques learned in this module w...
course htb academyattacking
https://academy.hackthebox.com/course/preview/advanced-deserialization-attacks
Advanced Deserialization Attacks Course | HTB Academy
This module focuses on developing custom exploits for .NET deserialization vulnerabilities from a whitebox perspective.
attacks course htbadvanced
https://academy.hackthebox.com/course/preview/introduction-to-information-security
Introduction to Information Security Course | HTB Academy
This theoretical module provides a comprehensive introduction to the foundational components of information security, focusing on the structure and operation...
course htb academyinformation
https://academy.hackthebox.com/course/preview/linux-privilege-escalation
Linux Privilege Escalation Course | HTB Academy
Privilege escalation is a crucial phase during any security assessment. During this phase, we attempt to gain access to additional users, hosts, and resource...
privilege escalation course
https://academy.hackthebox.com/course/preview/wi-fi-password-cracking-techniques
Wi-Fi Password Cracking Techniques Course | HTB Academy
Password cracking is a cornerstone of wireless penetration testing, as many real-world assessments hinge on the strength of the Wi-Fi password and our abilit...
wi fi passwordcourse htb
https://academy.hackthebox.com/course/preview/intro-to-c2-operations-with-sliver
Intro to C2 Operations with Sliver Course | HTB Academy
Active Directory is present in over 90% of corporate environments and it is the prime target for attacks. This module covers the attack chain from getting th...
course htb academyintrosliver
https://academy.hackthebox.com/course/preview/detecting-access-token-manipulation-attacks
Detecting Access Token Manipulation Attacks Course | HTB Academy
This module focuses on Windows privilege escalation techniques through access token manipulation. It covers various topics, including Windows processes, acce...
access token manipulationhtb
https://academy.hackthebox.com/course/preview/file-inclusion
File Inclusion Course | HTB Academy
course htb academyfile
https://academy.hackthebox.com/course/preview/whitebox-attacks
Whitebox Attacks Course | HTB Academy
attacks course htbwhitebox
https://academy.hackthebox.com/course/preview/windows-fundamentals
Windows Fundamentals Course | HTB Academy
This module covers the fundamentals required to work comfortably with the Windows operating system.
fundamentals course htb
https://academy.hackthebox.com/course/preview/understanding-log-sources--investigating-with-splunk
Understanding Log Sources & Investigating with Splunk Course | HTB Academy
This module provides a comprehensive introduction to Splunk, focusing on its architecture and the creation of effective detection-related SPL (Search Process...
splunk course htblogsources
https://academy.hackthebox.com/course/preview/attacking-graphql
Attacking GraphQL Course | HTB Academy
GraphQL is a query language for APIs as an alternative to REST APIs. Clients are able to request data through GraphQL queries. If improperly configured or im...
course htb academyattacking
https://academy.hackthebox.com/course/preview/wi-fi-penetration-testing-tools-and-techniques
Wi-Fi Penetration Testing Tools and Techniques Course | HTB Academy
Wireless network penetration testing presents a unique challenge due to the wide variety of technologies, protocols, and security configurations encountered...
wi fi penetrationcourse htb
https://academy.hackthebox.com/course/preview/intermediate-network-traffic-analysis
Intermediate Network Traffic Analysis Course | HTB Academy
Through network traffic analysis, this module sharpens skills in detecting link layer attacks such as ARP anomalies and rogue access points, identifying netw...
traffic analysis coursehtb
https://academy.hackthebox.com/course/preview/network-enumeration-with-nmap
Network Enumeration with Nmap Course | HTB Academy
Nmap is one of the most used networking mapping and discovery tools because of its accurate results and efficiency. The tool is widely used by both offensive...
course htb academynetworknmap
https://academy.hackthebox.com/course/preview/getting-started
Getting Started Course | HTB Academy
This module covers the fundamentals of penetration testing and an introduction to Hack The Box.
course htb academygetting
https://academy.hackthebox.com/course/preview/http-attacks
HTTP Attacks Course | HTB Academy
This module covers three HTTP vulnerabilities: CRLF Injection, HTTP Request Smuggling, and HTTP/2 Downgrading. These vulnerabilities can arise on the HTTP le...
attacks course htbhttpacademy
https://academy.hackthebox.com/course/preview/attacking-wi-fi-protected-setup-wps
Attacking Wi-Fi Protected Setup (WPS) Course | HTB Academy
In this module, we delve into the intricacies of WPS, uncovering the common vulnerabilities that plague this technology. From brute-force attacks to more sop...
wi fi protectedcourse htbwps
https://academy.hackthebox.com/course/preview/android-application-malware-analysis
Android Application Malware Analysis Course | HTB Academy
This module offers a hands-on introduction to the world of Android malware analysis. It covers common malware types, the ways they abuse system permissions,...
malware analysis coursehtb
https://academy.hackthebox.com/course/preview/wired-equivalent-privacy-wep-attacks
Wired Equivalent Privacy (WEP) Attacks Course | HTB Academy
attacks course htbwiredwep
https://academy.hackthebox.com/course/preview/wmi-tradecraft-analysis
WMI Tradecraft Analysis Course | HTB Academy
This module introduces WMI (Windows Management Instrumentation) based attack and analysis techniques, from both local and remote standpoints. WMI is a core W...
analysis course htbwmiacademy
https://academy.hackthebox.com/course/preview/detection--opsec-cyber-range
Detection & OpSec Cyber Range Course | HTB Academy
course htb academycyber range
https://academy.hackthebox.com/course/preview/httpstls-attacks
HTTPs/TLS Attacks Course | HTB Academy
This module covers details on Transport Layer Security (TLS) and how it helps to make HTTP secure with the widely used HTTPS. That includes how TLS works, ho...
attacks course htbhttpstls
https://academy.hackthebox.com/course/preview/llm-output-attacks
LLM Output Attacks Course | HTB Academy
In this module, we will explore different LLM output vulnerabilities resulting from improper handling of LLM outputs and insecure LLM applications. We will a...
attacks course htbllm output
https://academy.hackthebox.com/course/preview/process-injection-attacks-and-detection
Process Injection Attacks and Detection Course | HTB Academy
This module focuses on understanding the process injection techniques attackers use to execute malicious code within the context of legitimate processes. Thi...
course htb academyprocess
https://academy.hackthebox.com/course/preview/active-directory-powerview
Active Directory PowerView Course | HTB Academy
This module covers AD enumeration focusing on the PowerView and SharpView tools. We will cover various techniques for enumerating key AD objects that will in...
course htb academyactive
https://academy.hackthebox.com/course/preview/introduction-to-penetration-testing
Introduction to Penetration Testing Course | HTB Academy
In this module, we will get into the fundamentals of penetration testing, a critical aspect of cybersecurity theory that explains how professionals in the fi...
penetration testing coursehtb
https://academy.hackthebox.com/course/preview/attacking-common-applications
Attacking Common Applications Course | HTB Academy
Penetration Testers can come across various applications, such as Content Management Systems, custom web applications, internal portals used by developers an...
applications course htbcommon
Sponsored https://www.maturescam.com/
Free Girls Live Sex - Hot Live Sex Shows on MaturesCam!
Free Girls Live Sex Shows on Real Sex Webcams. Absolute privacy guaranteed.
https://academy.hackthebox.com/course/preview/session-security
Session Security Course | HTB Academy
course htb academysession
https://academy.hackthebox.com/course/preview/android-application-dynamic-analysis
Android Application Dynamic Analysis Course | HTB Academy
This module focuses on the real-time analysis and manipulation of Android applications to uncover vulnerabilities that arise during execution. By examining h...
analysis course htbandroid
https://academy.hackthebox.com/course/preview/whitebox-pentesting-101-command-injection
Whitebox Pentesting 101: Command Injection Course | HTB Academy
This module focuses on discovering Command Injection vulnerabilities in NodeJS servers and exploiting them to control the server.
injection course htbwhitebox
https://academy.hackthebox.com/course/preview/footprinting
Footprinting Course | HTB Academy
This module covers techniques for footprinting the most commonly used services in almost all enterprise and business IT infrastructures. Footprinting is an e...
course htb academy
https://academy.hackthebox.com/course/preview/cross-site-scripting-xss
Cross-Site Scripting (XSS) Course | HTB Academy
Cross-Site Scripting (XSS) vulnerabilities are among the most common web application vulnerabilities. An XSS vulnerability may allow an attacker to execute a...
course htb academycrosssite
https://academy.hackthebox.com/course/preview/ai-evasion---sparsity-attacks
AI Evasion - Sparsity Attacks Course | HTB Academy
This module explores sparsity-constrained adversarial attacks that minimize the number of modified input features rather than perturbation magnitude, showing...
attacks course htbaievasion
https://academy.hackthebox.com/course/preview/parameter-logic-bugs
Parameter Logic Bugs Course | HTB Academy
course htb academyparameter
https://academy.hackthebox.com/course/preview/cracking-passwords-with-hashcat
Cracking Passwords with Hashcat Course | HTB Academy
This module covers the fundamentals of password cracking using the Hashcat tool.
course htb academycracking
https://academy.hackthebox.com/course/preview/introduction-to-python-3
Introduction to Python 3 Course | HTB Academy
Automating tedious or otherwise impossible tasks is highly valued during both penetration testing engagements and everyday life. Introduction to Python 3 aim...
course htb academypython
https://academy.hackthebox.com/course/preview/detecting-windows-attacks-with-splunk
Detecting Windows Attacks with Splunk Course | HTB Academy
This Hack The Box Academy module is focused on pinpointing attacks on Windows and Active Directory. Utilizing Splunk as the cornerstone for investigation, th...
splunk course htbdetecting
https://academy.hackthebox.com/course/preview/linux-process-injections--detections
Linux Process Injections & Detections Course | HTB Academy
This module introduces various Linux process injection techniques, from basic to advanced ones, from both local and remote standpoints. It focuses on how ELF...
course htb academylinuxamp
https://academy.hackthebox.com/course/preview/sql-injection-fundamentals
SQL Injection Fundamentals Course | HTB Academy
Databases are an important part of web application infrastructure and SQL (Structured Query Language) to store, retrieve, and manipulate information stored i...
fundamentals course htbsql
https://academy.hackthebox.com/course/preview/windows-lateral-movement
Windows Lateral Movement Course | HTB Academy
Windows lateral movement involves techniques to navigate and control remote systems within a network, primarily after gaining initial access. It is crucial i...
course htb academywindows
https://academy.hackthebox.com/course/preview/hacking-wordpress
Hacking WordPress Course | HTB Academy
WordPress is an open-source Content Management System (CMS) that can be used for multiple purposes.
course htb academyhacking
https://academy.hackthebox.com/course/preview/active-directory-ldap
Active Directory LDAP Course | HTB Academy
This module provides an overview of Active Directory (AD), introduces core AD enumeration concepts, and covers enumeration with built-in tools.
active directory ldapcourse
https://academy.hackthebox.com/course/preview/introduction-to-linux-forensics
Introduction to Linux Forensics Course | HTB Academy
This module covers techniques for conducting digital forensics on Linux systems prevalent in enterprise servers and cloud infrastructures. Introduction to Li...
forensics course htblinux
https://academy.hackthebox.com/course/preview/fundamentals-of-ai
Fundamentals of AI Course | HTB Academy
This module provides a comprehensive guide to the theoretical foundations of Artificial Intelligence (AI). It covers various learning paradigms, including su...
course htb academyai
https://academy.hackthebox.com/course/preview/wi-fi-penetration-testing-basics
Wi-Fi Penetration Testing Basics Course | HTB Academy
wi fi penetrationcourse htb
https://academy.hackthebox.com/course/preview/dacl-attacks-i
DACL Attacks I Course | HTB Academy
Discretionary Access Control Lists (DACLs), found within security descriptors, are a fundamental component of the security model of Windows and Active Direct...
course htb academydaclattacks
https://academy.hackthebox.com/course/preview/intro-to-network-traffic-analysis
Intro to Network Traffic Analysis Course | HTB Academy
Network traffic analysis is used by security teams to monitor network activity and look for anomalies that could indicate security and operational issues. O...
traffic analysis courseintro
https://academy.hackthebox.com/course/preview/dacl-attacks-ii
DACL Attacks II Course | HTB Academy
In this second module on Discretionary Access Control Lists (DACLs), we delve into sophisticated attack techniques and strategies within Windows Active Direc...
course htb academydaclattacks
https://academy.hackthebox.com/course/preview/introduction-to-windows-evasion-techniques
Introduction to Windows Evasion Techniques Course | HTB Academy
In this module we will cover the basics of evading antivirus solutions (Windows Defender specifically) from an attackers point-of-view.
techniques course htbwindows
https://academy.hackthebox.com/course/preview/active-directory-hardening---recon--initial-access
Active Directory Hardening - Recon & Initial Access Course | HTB Academy
Active Directory (AD) presents a vast attack surface and can be challenging to secure and control. Small changes can have a cascading effect, introducing fur...
course htb academyactiverecon
https://academy.hackthebox.com/course/preview/advanced-xss-and-csrf-exploitation
Advanced XSS and CSRF Exploitation Course | HTB Academy
Modern web browsers and applications utilize a variety of security measures to protect against CSRF and XSS vulnerabilities, rendering their exploitation mor...
course htb academyadvancedxss
https://academy.hackthebox.com/course/preview/introduction-to-deserialization-attacks
Introduction to Deserialization Attacks Course | HTB Academy
In this module, we will explore deserialization attacks with specific examples in Python and PHP.
attacks course htbacademy
https://academy.hackthebox.com/course/preview/ai-privacy
AI Privacy Course | HTB Academy
This module explores privacy attacks against machine learning models and the differential privacy defenses that protect models from such attacks.
course htb academyaiprivacy
https://academy.hackthebox.com/course/preview/using-web-proxies
Using Web Proxies Course | HTB Academy
Web application penetration testing frameworks are an essential part of any web penetration test. This module will teach you two of the best frameworks: Burp...
course htb academyusing web
https://academy.hackthebox.com/course/preview/working-with-idsips
Working with IDS/IPS Course | HTB Academy
course htb academyids ips
Sponsored https://www.liveprivates.com/
Free Live Sex Shows on LivePrivates.com
Free Live Sex Shows on Real Sex Webcams. Enjoy the freedom of exciting, one-on-one and anonymous live cam sex chat. Absolute privacy guaranteed.
https://academy.hackthebox.com/course/preview/active-directory-enumeration--attacks
Active Directory Enumeration & Attacks Course | HTB Academy
Active Directory (AD) is the leading enterprise domain management suite, providing identity and access management, centralized domain administration, authent...
attacks course htbactiveamp
https://academy.hackthebox.com/course/preview/introduction-to-binary-fuzzing
Introduction to Binary Fuzzing Course | HTB Academy
Fuzzing is a powerful software testing technique that deliberately introduces chaos into your applications. By bombarding your code with unexpected or malfor...
fuzzing course htbbinary
https://academy.hackthebox.com/course/preview/attacking-wpa3-wi-fi-networks
Attacking WPA3 Wi-Fi Networks Course | HTB Academy
Wi-Fi Protected Access 3 improves upon WPA2 by offering stronger encryption, SAE for personal networks, OWE for open networks, and mandatory Protected Mana...
wi fi networkscourse htb
https://academy.hackthebox.com/course/preview/introduction-to-malware-analysis
Introduction to Malware Analysis Course | HTB Academy
This module offers an exploration of malware analysis, specifically targeting Windows-based threats. The module covers Static Analysis utilizing Linux and Wi...
malware analysis coursehtb
https://academy.hackthebox.com/course/preview/documentation--reporting
Documentation & Reporting Course | HTB Academy
Proper documentation is paramount during any engagement. The end goal of a technical assessment is the report deliverable which will often be presented to a...
reporting course htbamp
https://academy.hackthebox.com/course/preview/brief-intro-to-hardware-attacks
Brief Intro to Hardware Attacks Course | HTB Academy
This mini-module concisely introduces hardware attacks, covering Bluetooth risks and attacks, Cryptanalysis Side-Channel Attacks, and vulnerabilities like Sp...
attacks course htbbrief intro
https://academy.hackthebox.com/course/preview/introduction-to-networking
Introduction to Networking Course | HTB Academy
As an information security professional, a firm grasp of networking fundamentals and the required components is necessary. Without a strong foundation in net...
course htb academynetworking
https://academy.hackthebox.com/course/preview/introduction-to-active-directory
Introduction to Active Directory Course | HTB Academy
Active Directory (AD) is present in the majority of corporate environments. Due to its many features and complexity, it presents a vast attack surface. To be...
course htb academyactive
https://academy.hackthebox.com/course/preview/information-gathering---web-edition
Information Gathering - Web Edition Course | HTB Academy
This module equips learners with essential web reconnaissance skills, crucial for ethical hacking and penetration testing. It explores both active and passiv...
course htb academyinformation
https://academy.hackthebox.com/course/preview/applications-of-ai-in-infosec
Applications of AI in InfoSec Course | HTB Academy
This module is a practical introduction to building AI models that can be applied to various infosec domains. It covers setting up a controlled AI environmen...
course htb academyaiinfosec
https://academy.hackthebox.com/course/preview/penetration-testing-process
Penetration Testing Process Course | HTB Academy
This module teaches the penetration testing process broken down into each stage and discussed in detail. We will cover many aspects of the role of a penetrat...
process course htbpenetration
https://academy.hackthebox.com/course/preview/windows-kernel-telemetry--detection-techniques
Windows Kernel Telemetry & Detection Techniques Course | HTB Academy
This module offers a deep dive into Windows kernel telemetry mechanisms from a defensive security perspective, covering a broad spectrum of telemetry sources...
techniques course htbwindows