Example Curriculum
    
    Setting Up Lab
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    URL Hacking
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    IDOR and Business Logic Errors
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    SQL injection
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    XSS
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    XML
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Intermediate web attacks
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Network Enumeration
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Port Enumeration
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Gaining Foothold 
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Windows Enumeration
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Windows File Transfer
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Linux Enumeration and Privilege Escalation 
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Kernel Exploits
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    active directory 
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    buffer overflow
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll