A comprehensive overview of information and cyber security
Understanding threats how they affect your organization
Linux basics
Kali Linux
Passive and Active Information
Gathering Passive Reconnaissance with OSINT
Active Reconnaissance with Kali linux (Nmap, tcpdump, etc)
The Dark Web
Daily Hacker Challenge
System Exploitation
Exploitation techniques and tools
Please note: That all fields marked with an asterisk (*) are required.
Unsupported Browser Detected
The browser you are using is not supported that will prevent you from accessing certain features of the website. We want you to have the best possible experience. For this you'll need to use a supported browser and upgrade to the latest version.