Web application security testing using ffuf for directory and subdomain fuzzing, vulnerability discovery, and penetration testing techniques
Active Directory penetration testing using Impacket, Kerbrute, and BloodHound for credential extraction and privilege escalation
Introduction to log analysis for cybersecurity: tools, techniques, and best practices for threat detection and incident response
TryHackMe getting started guide: platform navigation, room completion, and cybersecurity learning fundamentals
Layer 2 network attacks: MAC flooding to enable traffic sniffing and ARP spoofing for man-in-the-middle attacks
Complete Metasploit framework guide: exploitation, payloads, post-exploitation, and practical penetration testing scenarios
Comprehensive networking fundamentals covering OSI model, TCP/IP, subnetting, and core network security concepts
Master Linux fundamentals for cybersecurity including command line operations, file systems, permissions, and security concepts
Hands-on exploration of the OWASP Top 10 2021 web application security risks with practical challenges and exploitation techniques
Complete guide to SQL injection attacks including Union-based injection, database enumeration, file operations, and practical exploitation techniques
A comprehensive walkthrough on forensic analysis of Windows systems using registry hives, execution logs, USB artifacts, and triage data collected with KAPE and analyzed with Eric Zimmerman’s tools.
A beginner-friendly, yet deeply practical exploration of the Windows operating system through the lens of cybersecurity, covering permissions, services, sessions, and administrative tools.