Best Practices and Risks Considerations in Automation like LCNC and RPA
By Jordan Bonagura Technologies such as Low-Code/No-Code (LCNC) and Robotic Process Automation (RPA) have become fundamental in the digital transformation of companies. …
Passive and Active Reconnaissance in Cybersecurity OSINT
Disclaimer: This is for educational purposes only. Among the key techniques used by cybersecurity professionals to understand and evaluate potential …
The Power of OSINT in Cyber Threat Intelligence
Disclaimer: This is for educational purposes only. In today’s interconnected world, cyber threats continue to grow in sophistication, frequency, and …
Aerial Assault: Combining Drones and Pentesting (W54)
Discover how to use drones for penetration testing with this innovative course. Gain skills in offensive and defensive drone operations, understand technical foundations, and learn about ethical and legal considerations. Perfect for cybersecurity professionals seeking to stay ahead in the field.
Uncovering Hidden Domains: A Guide to Subdomain Enumeration
Disclaimer: This is for educational purposes only. Subdomain enumeration is a foundational aspect of reconnaissance in cybersecurity, essential for penetration …

Aerospace Cybersecurity: Satellite Hacking (W53)
Dive into the essentials of satellite cybersecurity with this comprehensive course. Learn satellite reconnaissance, communication analysis, decoding techniques, and vulnerability assessments. Ideal for all skill levels, this course provides practical experience and theoretical knowledge, preparing you to protect satellite systems from cyber threats.
Best Practices and Risks Considerations in Automation like LCNC and RPA
By Jordan Bonagura Technologies such as Low-Code/No-Code (LCNC) and Robotic Process Automation (RPA) have become fundamental in the digital transformation of companies. …
Passive and Active Reconnaissance in Cybersecurity OSINT
Disclaimer: This is for educational purposes only. Among the key techniques used by cybersecurity professionals to understand and evaluate potential …
The Power of OSINT in Cyber Threat Intelligence
Disclaimer: This is for educational purposes only. In today’s interconnected world, cyber threats continue to grow in sophistication, frequency, and …
Uncovering Hidden Domains: A Guide to Subdomain Enumeration
Disclaimer: This is for educational purposes only. Subdomain enumeration is a foundational aspect of reconnaissance in cybersecurity, essential for penetration …
OSINT in the Cloud: Techniques for Gathering Intelligence on Cloud Storage Services
Disclaimer: This is for educational purposes only. Open-source intelligence, commonly known as OSINT, plays a vital role in modern cybersecurity and information gathering. As businesses and individuals increasingly use cloud storage services, conducting OSINT on cloud resources has become invaluable for understanding potential vulnerabilities, misconfigurations, and accessible data in the cloud landscape. However, OSINT on cloud storage services is as much an art as it is a science, demanding a blend of technical knowledge, ethical awareness, and strategic thinking. This article explores methods to collect OSINT on popular cloud storage platforms like Amazon S3, Google Cloud Storage, and Azure Blob …
The Impact of SOCMINT on Modern Cybersecurity
Disclaimer: This is for educational purposes only. In an era where social media has become as central to our lives as email and smartphones, it's no surprise that this space also holds immense potential for cybersecurity intelligence. Social Media Intelligence, or SOCMINT, plays a unique and crucial role in contemporary cybersecurity, going beyond traditional Open Source Intelligence (OSINT) by focusing on the dynamic, ever-evolving data found across social media platforms. SOCMINT’s ability to draw insights from user behavior, conversations, and emerging trends on these platforms offers cybersecurity teams a proactive edge, allowing them to detect, prevent, and respond to cyber …
OSINT in Satellite Cybersecurity
Disclaimer: This is for educational purposes only. In the expansive and interconnected landscape of modern cybersecurity, satellites represent a unique and critical frontier. These systems serve as essential infrastructure for global communications, navigation, and national security, yet their protection demands a nuanced approach due to vulnerabilities that extend from ground stations to the satellites themselves in orbit. As the technology supporting satellite systems advances, so too does the complex array of cyber threats targeting them. Safeguarding satellites isn’t simply about protecting complex machinery in space; it’s about managing a web of connections, sensitive data, and international dependencies. A critical tool …
5 Hidden-Gem OSINT Tools Every Penetration Tester Needs in 2024
Disclaimer: This is for educational purposes only. When it comes to penetration testing, information is power. The right OSINT (Open Source Intelligence) tool can make all the difference between a superficial scan and a deeply insightful engagement. While most pentesters are familiar with popular tools like Shodan, Maltego, and theHarvester, there are lesser-known tools that offer unique advantages, often revealing layers of intelligence that mainstream tools miss. In 2024, pentesters are increasingly reaching for these hidden gems to gain an edge and deliver nuanced insights for their clients. In this article, we’ll dive into five OSINT tools that may not …
How OSINT is Transforming Automotive Cybersecurity: A Closer Look at Protecting Connected Cars with Public Intelligence
Disclaimer: This is for educational purposes only. Cars today are more than just machines—they’re sophisticated, internet-enabled devices, loaded with software, apps, and communication systems that make them both highly functional and, unfortunately, vulnerable to cyber threats. With these advancements, automakers are turning to Open Source Intelligence, or OSINT, as a key player in protecting their vehicles. By gathering public data, OSINT helps automotive security teams identify potential vulnerabilities and threats early, giving them a chance to address issues before they become problems. Here’s a closer look at the many ways OSINT is used to secure connected cars, with real-world insights …

Aerial Assault: Combining Drones and Pentesting (W54)
Discover how to use drones for penetration testing with this innovative course. Gain skills in offensive and defensive drone operations, understand technical foundations, and learn about ethical and legal considerations. Perfect for cybersecurity professionals seeking to stay ahead in the field.
Aerospace Cybersecurity: Satellite Hacking (W53)
Dive into the essentials of satellite cybersecurity with this comprehensive course. Learn satellite reconnaissance, communication analysis, decoding techniques, and vulnerability assessments. Ideal for all skill levels, this course provides practical experience and theoretical knowledge, preparing you to protect satellite systems from cyber threats.
AutoSec Pro: Vehicle Cybersecurity Mastery (W52)
AutoSec Pro is an immersive course diving into the world of automotive cybersecurity, providing an in-depth understanding of modern vehicle systems and their vulnerabilities. This cutting-edge course leverages a hands-on approach to exploit and mitigate potential threats while seamlessly integrating the ISO 21434 standard. Harness the power of innovation and technology as you spearhead the effort to safeguard the future of smart transportation.
Creating Advanced Ransomware with Golang (W51)
In this course, you will develop a hybrid ransomware using, that is, with two encryptions RSA and AES with a programming language that is gaining a lot of strength - Golang
Mastering Splunk: A Comprehensive Guide (W50)
"Mastering Splunk: A Comprehensive Guide" is a comprehensive and hands-on course that covers all aspects of the Splunk platform, from the fundamentals to advanced topics. The course is designed to provide students with the knowledge and skills to effectively use Splunk to analyze and visualize data in their personal and professional lives.
The Most Notorious Bugs: SQL Injection & XSS (W49)
This course is designed for those who are looking to move their web application penetration skills to the next level! Working from scratch, this course aims to provide comprehensive knowledge of two of the most notorious and common vulnerabilities, SQL Injection and Cross Site Scripting.
OSINT Tools & TTPs for Pentesters and Red Teamers (W48)
In this course, Eva Prokofiev, the prominent expert in the CTI and OSINT areas, will share with you her know-how and point of view on how to examine a target not only from a "pentester's angle”, but also from other cybersecurity perspectives.
Become a Smart Bug Bounty Hunter (W47)
This course will cover the majority of the OWASP TOP 10 vulnerabilities as well as Web Application Penetration Testing. You will begin as a newbie with no previous experience in bug bounty hunting or penetration testing.
Mobile Ethical Hacking (W46)
This course will teach students the basics of mobile hacking and give real world examples on how such techniques can be used. It will also provide guidance on how to use the knowledge in security audits and bug bounty hunting.
