Ujas Bhadani OfficialNew Edition

Weaponizing Phase: Living Off The Land Technique

When it comes to analyzing and preventing cyber assaults, the cyber death chain is a vital foundation to have. The …

Jul 08,2024

6 min read

Mariana do Carmo Gouveia OfficialNew Edition

WEAPONIZATION: THE CRITICAL ELEMENT FOR SUCCESSFUL CYBER ATTACKS

The evolution of military strategies for the digital environment has given rise to the concept of the "kill chain," a …

Jul 05,2024

13 min read

François QUIQUET OfficialNew Edition

The Dark Side of the DNS or the War of the Port 53

What is DNS and why is it used? DNS stands for Domain Name System. It's essentially like a directory but …

Jul 03,2024

8 min read

Bartek AdachCourse

Build Ethical Hacking Arsenal with ChatGPT-4o (W76)

AI is all over the news. Politicians are concerned about its potential for Hacking, Phishing and Malware. Is it true? Microsoft has found APTs using ChatGPT already. How good is it? As a Pentester, what are you missing out on? Might AI take over your job? Take this course to stay ahead.

May 31,2024

7 min read

Fernando Velázquez OfficialNew Edition

Weaponization phase: Stop deploying a C2; let the Blue team do it for you.

In the current landscape, the phases of the Cyber Kill Chain are widely recognized and understood within the information security …

Jul 02,2024

7 min read

Ujas Bhadani OfficialNew Edition

Weaponizing Phase: Living Off The Land Technique

When it comes to analyzing and preventing cyber assaults, the cyber death chain is a vital foundation to have. The …

Jul 08,2024

6 min read

Mariana do Carmo Gouveia OfficialNew Edition

WEAPONIZATION: THE CRITICAL ELEMENT FOR SUCCESSFUL CYBER ATTACKS

The evolution of military strategies for the digital environment has given rise to the concept of the "kill chain," a …

Jul 05,2024

13 min read

François QUIQUET OfficialNew Edition

The Dark Side of the DNS or the War of the Port 53

What is DNS and why is it used? DNS stands for Domain Name System. It's essentially like a directory but …

Jul 03,2024

8 min read

Fernando Velázquez OfficialNew Edition

Weaponization phase: Stop deploying a C2; let the Blue team do it for you.

In the current landscape, the phases of the Cyber Kill Chain are widely recognized and understood within the information security …

Jul 02,2024

7 min read

Bartek Adach Course

Build Ethical Hacking Arsenal with ChatGPT-4o (W76)

AI is all over the news. Politicians are concerned about its potential for Hacking, Phishing and Malware. Is it true? Microsoft has found APTs using ChatGPT already. How good is it? As a Pentester, what are you missing out on? Might AI take over your job? Take this course to stay ahead.

May 31,2024

9 min read

Atul Tiwari Course

Kubernetes Ethical Hacking (W75)

This course focuses on ethical hacking of Kubernetes, the leading container orchestration platform used by over 50% of organizations. Through simulating attacks, the course aims to identify and exploit vulnerabilities to assess and enhance the system’s security posture.

Apr 25,2024

10 min read

Afshan Naqvi Course

AWS Security Essentials: Building a Resilient Cloud Defense (W74)

"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.

Nov 16,2023

12 min read

Rausson Gouveia Course

Create Your Own Command & Control Tool with Golang (W73)

Enter a short description of the course.

Oct 04,2023

6 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023

Watch the rest of this video with a free account.

Already have an account? Sign in

What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.