Introduction to AWS Enumeration

Learn the basics of AWS enumeration in this Hands-On Labs course. Enumeration is the process of identifying and cataloguing AWS resources and services…

IAM Privilege Escalation Labs

Learn first-hand how attackers exploit IAM misconfigurations in AWS with tactics pulled from real case studies. This course is entirely made up of …

Wireless Deauthentication Attacks

In this project-based course, you will learn the fundamentals of deauthentication attacks, how to build, program, and use your very own deauther devic…

Beginner’s Guide to sqlmap

Learn to use one of the most popular tools to find SQL injection vulnerabilities: sqlmap. In this course, we start out by creating a simple, free, and…

Introduction to OS Command Injections

OS Command Injections are part of the OWASP Top 10 Web Application Security Risks, and as you will see in this course, this threat can result in serio…

Injection Attacks: The Free Guide

In this course, we explore the biggest risk facing web applications: injections. While we will focus primarily on SQL injections, there are other type…