Example Curriculum
Setting Up Lab
Available in
days
days
after you enroll
URL Hacking
Available in
days
days
after you enroll
IDOR and Business Logic Errors
Available in
days
days
after you enroll
SQL injection
Available in
days
days
after you enroll
XSS
Available in
days
days
after you enroll
XML
Available in
days
days
after you enroll
Intermediate web attacks
Available in
days
days
after you enroll
Network Enumeration
Available in
days
days
after you enroll
Port Enumeration
Available in
days
days
after you enroll
Gaining Foothold
Available in
days
days
after you enroll
Windows Enumeration
Available in
days
days
after you enroll
Windows File Transfer
Available in
days
days
after you enroll
Linux Enumeration and Privilege Escalation
Available in
days
days
after you enroll
Kernel Exploits
Available in
days
days
after you enroll
active directory
Available in
days
days
after you enroll
buffer overflow
Available in
days
days
after you enroll