Learn how to identify and map potentially vulnerable external assets using OWASP Amass, the industry-standard tool for asset discovery. This course covers passive and active reconnaissance techniques to scan, analyze, and secure exposed assets.
Mastering Follina (CVE-2022-30190): Exploitation, Detection and Mitigation
Learn how attackers exploit the Follina vulnerability (CVE-2022-30190) in Microsoft Office and develop the skills to analyze, detect, and mitigate this critical flaw through hands-on exercises and real-world examples.
Master the detection-as-code workflow to create, manage, and automate custom threat detections. Learn how to use Sigma, MITRE ATT&CK framework, and implement CI/CD pipelines for automated deployment and validation.