5 recently added or updated chapters
Chapter | Dates | Points | Action |
---|---|---|---|
![]() PDF Password Cracking and Document SecurityPassword Cracking: Advanced Techniques for Security Assessment |
Released:
01-09-2025
Updated:
01-09-2025
|
1 pts | |
![]() Rainbow Tables and Precomputed AttacksPassword Cracking: Advanced Techniques for Security Assessment |
Released:
29-08-2025
Updated:
29-08-2025
|
1 pts | |
![]() Brute Force and Hybrid Attack TechniquesPassword Cracking: Advanced Techniques for Security Assessment |
Released:
28-08-2025
Updated:
28-08-2025
|
1 pts | |
![]() Dictionary Attacks and Wordlist OptimizationPassword Cracking: Advanced Techniques for Security Assessment |
Released:
22-08-2025
Updated:
27-08-2025
|
1 pts | |
![]() Password Security FundamentalsPassword Cracking: Advanced Techniques for Security Assessment |
Released:
21-08-2025
Updated:
21-08-2025
|
1 pts |
7 courses available
Course | Skills | Chapters | Points | Action |
---|---|---|---|---|
![]() HDNA Ethical Hacking CourseThis course is designed for individuals aiming to specialize in advanced penetration testing and Capture The Flag (CTF) challenges. |
CTFETHICAL HACKINGPENTESTING | 5 chapters | 5 pts | Start Course |
![]() HTTP Header Manipulation: IP SpoofingThis course explores IP spoofing in HTTP headers and presents web browser modules useful for penetration testing. |
HTTPIP | 3 chapters | 3 pts | Start Course |
![]() Web Application Security: Exploitation and DefenseMaster critical web application vulnerabilities through hands-on exploitation techniques and defensive strategies. Learn to identify, exploit, and remediate the OWASP Top 10 vulnerabilities using industry-standard tools and methodologies. |
OWASP Top 10SQL InjectionCross-Site ScriptingCSRFSSRFAuthentication BypassFile Upload AttacksWeb Security AssessmentBurp SuiteSQLMap | 12 chapters | 12 pts | Start Course |
![]() Remote Code Execution (RCE)RCE allows execution of unauthorized code remotely, compromising system security and control. Learning about RCE is critically important. |
RCEPHP | 3 chapters | 3 pts | Start Course |
![]() Password Cracking: Advanced Techniques for Security AssessmentMaster professional password cracking with hashcat, John the Ripper, and advanced attack techniques. Learn dictionary attacks, brute force, rainbow tables, and hash analysis for ethical penetration testing and security assessments. |
password-crackinghashcatjohn-the-ripperdictionary-attacksbrute-forcerainbow-tableshash-analysispenetration-testingsecurity-assessmentcryptography | 5 chapters | 5 pts | Start Course |
![]() Nmap Mastery: Dominate Network ScanningLearn to master Nmap, the trusted tool for network mapping and discovery. Used by security experts worldwide, this course covers the fundamentals needed to perform precise and efficient network enumeration. Elevate your cybersecurity skills now! |
NMAPNETWORKDISCOVERY | 4 chapters | 4 pts | Start Course |
![]() JWT Ethical Hacking: Token Takeover TacticsMaster JWT vulnerabilities and token-based attack vectors through hands-on ethical hacking techniques |
jwttoken-securityweb-securitypenetration-testingethical-hacking | 4 chapters | 4 pts | Start Course |
Sign-in to your account to access your hacking courses and cyber security labs.
Access all hacking courses and cyber security labs.