test pools - overall content 123 123 123 overall verall content 123 123 123 overall
This course includes discussion of various protocols and using their relevant tools
- Introduction to OSINT Fundamentals - twelve modules on introduction to OSINT Fundamentals
Placeholder until content provided Placeholder until content provided Placeholder until content provided Placeholder until content provided
Python, Bash, and PowerShell. This course aims to teach how to use each of these languages to achieve similar goals.
This course will explore the process of how to identify a forgotten or unknow password, and obtain a hash.
Web technology is key to modern day life, however with all the interacting components and modern features it is can be vulnerable to attack.
Linux is an operating system that is commonly used by technical specialists due to its flexibility and the availability of tools.
This module will focus on introducing the tools and techniques available to identify potential targets.
Powershell is a modern command shell found on Windows. This module will introduce Powershell and how to make the most of its features.
This module explores basic network architecture and how to understand network boundaries.
This module will introduce the key components of Metasploit, why they are important and how to use them to full effect.
This module will explore laws applicable in the UK that cyber security professionals should be aware of.
In this module we will explore how to pivot through a network and achieve lateral movement.
Python, Bash, and PowerShell. This course aims to teach how to use each of these languages to achieve similar goals.
This course will explore the process of how to identify a forgotten or unknow password, and obtain a hash.
Web technology is key to modern day life, however with all the interacting components and modern features it is can be vulnerable to attack.