Nmap IDLE IPID, UDP, and SCTP Scans
Scan Optimization, OS Identification, and IDS/Firewall Evasion
NetBIOS, SMB, SNMP, and LDAP Enumeration
NTP, NFS, SMTP, and FTP Enumeration
Vulnerability Assessment, Management, and Classification
Vulnerability Assessment Types, Models, Tools, and Reports
Windows Authentication
Passwords Attacks, Extraction, and Cracking
Buffer Overflows, Privilege Escalation, and System Access
Steganography and Avoiding Detection
AD Enumeration, Mimikatz, and Pivoting Techniques
Malware, Threats, Trojans, and Viruses
Fileless Malware, Malware Analysis, and Countermeasures
Sniffing and Poisoning
Social Engineering, Insider Threats, and Identity Theft
DoS, DDoS, Volumetric, and Protocol Attacks
App Layer Attacks, Botnets, and DoS Countermeasures
Hijacking Concepts and Countermeasures
Intrusion Detection and Prevention, Firewalls, and Honeypots
Web Server Hacking, Attacks, and Attack Methodologies
Web Application Attacks and Vulnerabilities
Web App Hacking Methodology, CSRF Attacks, and Input Filter Evasion
IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks
SQL Injection Concepts and Attacks
SQL Injection and SQLMap
Wireless Concepts, Threats, and Hacking Tools
Wireless Hacking and Countermeasures
Mobile Hacking, OS Security, and Device Management
IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures
Operational Technology Concepts, Attack Tools, and Countermeasures
Cloud Computing, Containers, Hacking, and Security Controls
Cryptography, Algorithms, Implementations, and Tools
PKI, Cryptanalysis, and Attack Countermeasures