For years, the tools contained within PowerSploit have provided attackers and defenders with the capability to easily exploit misconfigured AD environments. Learn how to use PowerSploit to compromise systems, gather data, and escalate privileges.
CCSP®: Cloud Governance, Data Privacy, and Audit
If you are investigating or currently consuming cloud services it is imperative to understand pertinent data privacy requirements, how to provide assurance of adequate controls, and a means to enforce these activities.
The Information Systems Auditing Process: IT Management
Auditors are required to provide insight and analysis for the effective management of IT investment and operations. This course will equip you with the knowledge you need to perform audits of IT management.
Conducting Active Reconnaissance for CompTIA PenTest+
Active reconnaissance is a necessary evil. It can sometimes alert defense teams and systems that you're snooping around, but it also helps you to see and document everything about each note on the network. Learn how to active recon the right way.
Penetrating Networks for CompTIA PenTest+
Weaknesses in your network infrastructure will enable a security professional to gain entry to hosts in the resources, eavesdrop on data in transit, and disturb communications. See how these actions can have serious consequences for the organization.
Batch Offer Codes
Be sure to only enter offer codes separated by line breaks and does not include commas.