Technical Security Fundamentals
Learn How Security Really Works
Theory, Technical Examples, and Tutorials
Intro
Passwords
Who is Tracking You?
Update Your Computer and Scan
Updating Your Lab
Support Roppers
Join our Chat Room(s)
Chapter Survey 1
Hashing
Cracking Passwords
Network Architecture Notes
Cyber Killchain
Post-Exploitation
Malware Types
Job Roles - Red vs Blue
Phishing Case Study
Man/Machine in the Middle
Chapter Survey 6
Linux Password Reset
Windows Password Reset
Technical Attacks
Chapter Survey 3
How to Tell if You are Hacked
Anti-Virus Basics
Threat Hunting Basics
Linux Network Hunting Lab
Linux Process Hunting
Windows Network Threat Hunting
Windows Process Hunting
Malware Removal
Chapter Survey 7
Attacker Mindset
Responsible Offensive Security
Recon and Enumeration
Baby Steps
Linux Privesc
Windows Privesc
Baby Metasploit
Explain how different pricing options might be valuable to different segments of your audience.
Regular price
Add your email to get the latest updates.
For support, feedback, or if you just want to say hello, my email is [email protected]