Our Courses

Course Icon

Web Application Enumeration

Learn the fundamentals of web application enumeration, including techniques to discover hidden endpoints, directories, and parameters. This course equips you with skills to map out web applications effectively before conducting security assessments.

Duration: 1 week
Price: 49 CHF
Course Icon

Web Exploitation Basics

Dive into the core concepts of web exploitation. Understand common vulnerabilities like XSS, SQL injection, and CSRF, and learn how to exploit them ethically. This course builds a strong foundation for aspiring penetration testers.

Duration: 1 week
Price: 109 CHF
Course Icon

Advanced Web Exploitation Techniques

Take your web exploitation skills to the next level. Explore advanced topics such as server-side template injection, deserialization attacks, and race conditions. This course is designed for those looking to tackle complex web security challenges.

Duration: 2 weeks
Price: 109 CHF
Course Icon

Windows Digital Forensics Fundamentals

Gain essential knowledge in Windows digital forensics. Learn how to analyze Windows file systems, registry, and memory dumps to uncover forensic artifacts and investigate security incidents effectively.

Course Icon

Linux Digital Forensics Fundamentals

Master the basics of digital forensics on Linux systems. This course covers file system analysis, log examination, and memory analysis techniques crucial for investigating Linux-based environments.

Course Icon

Advanced Detection Prevention

Learn advanced strategies to detect and prevent sophisticated cyber threats. This course focuses on proactive defense mechanisms, anomaly detection, and implementing security controls to protect organizational assets.

Course Icon

Incident Response at Scale

Equip yourself with the skills to handle large-scale security incidents. This course covers incident response planning, coordination, and execution in complex environments, ensuring minimal impact on operations.

Course Icon

Windows Event Logs

Understand how to analyze Windows event logs for security monitoring and troubleshooting. Learn to interpret log data to detect suspicious activities and enhance your organization's security posture.

Course Icon

Threat Actor Threat Patterns

Delve into the methodologies and patterns used by threat actors. This course helps you understand attacker motives, techniques, and how to anticipate and mitigate potential threats proactively.