Example Curriculum

  Setting Up Lab
Available in days
days after you enroll
  URL Hacking
Available in days
days after you enroll
  IDOR and Business Logic Errors
Available in days
days after you enroll
  SQL injection
Available in days
days after you enroll
  XSS
Available in days
days after you enroll
  XML
Available in days
days after you enroll
  Intermediate web attacks
Available in days
days after you enroll
  Network Enumeration
Available in days
days after you enroll
  Port Enumeration
Available in days
days after you enroll
  Gaining Foothold
Available in days
days after you enroll
  Windows Enumeration
Available in days
days after you enroll
  Windows File Transfer
Available in days
days after you enroll
  Linux Enumeration and Privilege Escalation
Available in days
days after you enroll
  Kernel Exploits
Available in days
days after you enroll
  active directory
Available in days
days after you enroll
  buffer overflow
Available in days
days after you enroll

Note: to follow along with many of the exercises you will need a subscription to HackTheBox