Master reconnaissance techniques for ethical hacking, pentesting, and bug bounties in this hands-on course. Learn to expand attack surfaces, perform subdomain enumeration, fuzz targets, and automate processes with industry-leading tools.
Mastering Follina (CVE-2022-30190): Exploitation, Detection and Mitigation
Learn how attackers exploit the Follina vulnerability (CVE-2022-30190) in Microsoft Office and develop the skills to analyze, detect, and mitigate this critical flaw through hands-on exercises and real-world examples.
Master the detection-as-code workflow to create, manage, and automate custom threat detections. Learn how to use Sigma, MITRE ATT&CK framework, and implement CI/CD pipelines for automated deployment and validation.