Penetration Testing with Exploit Pack |Meet-up with Juan Sacco - Webinar Recording!
We present you the recording of our webinar with  Juan Sacco, the creator of Exploit Pack,  that took place on January …
RECORD A VIDEO TUTORIAL AND WIN 6 MONTHS OF HAKIN9 PREMIUM SUBSCRIPTION!
 The competition Record a penetration testing video tutorial. That’s it! You can present whatever you want - how to use …
Penetration Testing with Exploit Pack | Meet-up with Juan Sacco
Join our free webinar with the creator of Exploit Pack, Juan Sacco! Webinar date and time: Â Saturday, January 30th, @11 …
ZeroNights Conference in Moscow
ZeroNights is an international conference dedicated to the practical side of information security. ZeroNights shows new attack methods and threats, …
Unveiling Cyber Threats: Understanding Reconnaissance in the Cyber Kill Chain and the importance of Threat Intelligence
Introduction Many enterprises have significantly improved their cybersecurity posture the past decades, effectively preventing known attacks through the integration of …
Methods for Analyzing the Human Resource Aspect of Cybersecurity and Espionage
Introduction In the cybersecurity landscape, the concept of "watchers" encompasses a range of roles and intentions, each with its own …
Unveiling Digital Shadows: Understanding Modern Reconnaissance Techniques
In today's digital age, our online activities leave behind a trail of data that various entities meticulously collect and analyze. …
IDENTIFYING ATTACKERS IN THE EARLY PHASE OF THE CYBER KILL CHAIN
Modern cyberwarfare requires a deep understanding of attacker tactics and an agile response to protect organizations against evolving threats. In …
AWS Security Essentials: Building a Resilient Cloud Defense (W74)
"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.
Create Your Own Command & Control Tool with Golang (W73)
Enter a short description of the course.
Kismet Wireless: Network Monitoring and Analysis (W72)
COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …