program
days of hands-on learning
lectures from leading cybersecurity experts
cybersecurity experts from around the world
Prepare local and cloud environments, install tools, and learn ethical hacking principles for safe, responsible practice
Initial access and web exploits
Primary access techniques and web application attacks, including authentication bypass, SQLi, XSS, XXE, and command injection
Privilege escalation and lateral movement
Escalate privileges on Linux and Windows, compromise DMZ hosts, forward traffic, and move across the network
Evasion, Active Directory compromise, and professional growth
Evade detection, use encrypted channels, exploit Active Directory and domain controllers, plus countermeasures and ethics
External footprinting, domain and network discovery, host and port scanning to map the target environment