Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Arpan Jati reveals critical vulnerabilities in Xilinx's Zynq-7000 SoC platform, demonstrating RSA authentication bypass and encrypted bitstream recovery techniques that impact critical infrastructure security.
PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks.
To become a well-rounded Ethical Hacker and/or Penetration Tester, not only must you be familiar with the appropriate tools and techniques, but you must also craft your methodology for applying said skills.
This course is designed for those looking to gain skills related to penetration testing web applications.
Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.
Embark on your journey into the dynamic world of cybersecurity with our introductory course tailored for aspiring red team members or advanced penetration testers. Designed for those new to the realm of Antivirus (AV) and Endpoint Detection and Response (EDR) evasions.
The proliferation of IoT devices, both at home and in the office, has significantly expanded the attack vectors for bad actors trying to gain a foothold on your network. Learn to pentest them today!
Join CyberSage for your hacker initiation and kick off your Penetration Testing journey today!
The Linux Essentials certification from the Linux Professional Institute is designed to showcase your foundation skills in working with the Linux operating system.
The Linux in the Cloud series focuses on implementing the Linux operating system in a virtualized environment.
The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.
Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.
This course is designed to teach you about the 2021 version of the OWASP Top 10 Web Application Vulnerabilities. The OWASP Top 10 is a list of the most critical security risks to web applications, and it is widely used by organizations to improve their web application security.
In this series, Daniel and Brad will take a look at what a pentesting engagement looks like through the lens of Brad's experience as a pentester.
James Kettle of PortSwigger reveals sophisticated web race condition exploits, demonstrating how attackers can manipulate state machines and create backdoors through precise timing attacks.