Hiep Nguyen Open

How Simply Browsing The Internet Gives Scammers An Advantage – And What You Can Do About It

Data privacy has become one of the most talked about topics in 2023. According to recent statistics, the data brokering …

Aug 24, 2023

3 min read

Agata Staszelis Open

Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

This video tutorial presents how to deal with e-mails leading to malicious links. It is a part of our online …

Jan 26, 2023

3 min read

Agata Staszelis Open

E-Mails Leading to a Malicious Link | Client-Side Exploitation [FREE COURSE VIDEO]

This video tutorial presents how to deal with e-mails leading to malicious links. It is a part of our online …

Dec 19, 2022

3 min read

Agata Staszelis Open

Improper Error Handling | Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

This video tutorial presents how to deal with improper error handling. It is a part of our online course 'Penetration …

Dec 7, 2022

3 min read

Jeff Minakata Official New Edition

Phishing Breakdown

As the title implies, I will be breaking down a real-life phishing campaign that I have seen used a number …

Jul 22, 2024

3 min read

Ivan Suarez Official New Edition

Revolutionizing Workflow and Efficiency with Large Language Models (LLMs)

In the rapidly evolving landscape of artificial intelligence, large language models (LLMs) have emerged as powerful tools driving significant advancements …

Jul 15, 2024

3 min read

Filipi Pires Official New Edition

CVE-2024-6387 Vulnerability Checker

Overview This Python script is designed to check SSH servers for the CVE-2024-6387 vulnerability, specifically targeting the recently discovered regreSSHion, which …

Jul 11, 2024

3 min read

Kai Aizen Official New Edition

Weaponization in the Cloud: Unmasking the Threats and Tools

Unveiling the Cloud’s Hidden Dangers In the fast-paced world of cybersecurity, mastering the details of the cyber kill chain is …

Jul 10, 2024

3 min read

Bartek Adach Course

Build Ethical Hacking Arsenal with ChatGPT-4o (W76)

AI is all over the news. Politicians are concerned about its potential for Hacking, Phishing and Malware. Is it true? Microsoft has found APTs using ChatGPT already. How good is it? As a Pentester, what are you missing out on? Might AI take over your job? Take this course to stay ahead.

May 31, 2024

9 min read

Atul Tiwari Course

Kubernetes Ethical Hacking (W75)

This course focuses on ethical hacking of Kubernetes, the leading container orchestration platform used by over 50% of organizations. Through simulating attacks, the course aims to identify and exploit vulnerabilities to assess and enhance the system’s security posture.

Apr 25, 2024

10 min read

Afshan Naqvi Course

AWS Security Essentials: Building a Resilient Cloud Defense (W74)

"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.

Nov 16, 2023

12 min read

Rausson Gouveia Course

Create Your Own Command & Control Tool with Golang (W73)

Enter a short description of the course.

Oct 4, 2023

6 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023