Web application security testing using ffuf for directory and subdomain fuzzing, vulnerability discovery, and penetration testing techniques
Active Directory penetration testing using Impacket, Kerbrute, and BloodHound for credential extraction and privilege escalation
Introduction to log analysis for cybersecurity: tools, techniques, and best practices for threat detection and incident response