Black Hat
0-DAY UNNECESSARY: ATTACKING AND PROTECTING KUBERNETES, LINUX AND CONTAINERS
Learn how to attack and defend Kubernetes, Linux and containers from Jay Beale, who has led development of the Kubernetes CTF at DEF CON, Bastille Linux, the Center for Internet Security's first Linux security benchmark, and two Kubernetes tools: the Peirates attack tool and the Bust-a-Kube CTF cluster. In this fully hands-on course, you'll get an ...
0wning the Cloud - AWS, Azure, GCP, DigitalOcean and Aliyun
The modern digital ecosystem relies on cloud-hosted infrastructures,
often invisible to users. Securing these environments requires an
understanding of how attackers exploit generic weaknesses in cloud
services. This course provides a comprehensive view of cloud security
from an attacker's perspective, demonstrating how APIs,
misconfigurations, ...0xCD Hands-On Hacking Fundamentals
This introductory hacking course is focused on the fundamentals of the security landscape, how hackers think and the tools, tactics and techniques they use.
The course presents the background information, technical skills and basic concepts required to those desiring a foundation in the world of information security from an offensive perspective. ...0xCD Modern Wi-Fi Hacking
If you want to learn how to understand and compromise Wi-Fi networks, this is the course for you.
Key Points:
- Foundations of wireless network technologies
- How to approach different wireless network configurations and exploit them
- New approaches and tooling in the Wi-Fi hacking field
If you want to really understand what's ...0xCD Tactical Hacking Essentials
Are you looking to leap into a penetration testing career and gain essential practical hacking skills? Then this course is for you!
This extremely hands-on course is designed to provide you with a complete overview and methodology to start a career in penetration testing. Our core methodologies are instilled throughout this course. You'll ...1337 Offensive Hardware Hacking
The 1337 Offensive Hardware Hacking Training is a hands-on course designed to fulfill the skills gap that in the recent years emerged within the InfoSec scene in respect of the (I)IoT landscape. In it, students will be able to gather the needed theoretical knowledge and practical skills to engage with confidence hardware security audits involving ...
2024, A Space Hacking Odyssey
Sure, maybe you've hacked the planet, but how about hacking off planet? The final frontier has been designated as critical infrastructure. Satellites and other space systems are an integral part of our daily lives from navigation to communications, financial transactions, and national security. Cybersecurity for these assets is environmentally and ...
2024, A Space Hacking Odyssey [2100]
Sure, maybe you've hacked the planet, but how about hacking off planet? The final frontier has been designated as critical infrastructure. Satellites and other space systems are an integral part of our daily lives from navigation to communications, financial transactions, and national security. Cybersecurity for these assets is environmentally and ...
2025, A Space Hacking Odyssey
Sure, maybe you've hacked the planet, but how about hacking off planet!? The final frontier has been designated as critical infrastructure. Satellites and other space systems are an integral part of our daily lives from navigation to communications, financial transactions, and national security. Cybersecurity for these assets is environmentally and ...
360° Data Breaches: Risk Management and Response
In today's rapidly evolving threat landscape, data breaches are no longer just technical challenges—they are business-critical crises that demand strategic leadership. This advanced course is tailored for driven cybersecurity professionals, from seasoned security analysts to managers and CISOs, who seek to master the art and science of data breach ...