HG325: Network Intrusion Detection
HG325: Network Intrusion Detection delivers comprehensive technical knowledge, insight, and hands-on training you need to identify and mitigate adversories in your network. In this course you will be learning about the underlying theory of TCP/IP and the most used application protocols, such as HTTP/HTTPS, so that you can intelligently examine network traffic for signs of an intrusion. This course is for the people who want to deeply understand what is happening inside their network and want to be able to find zero-day threats on your network before disclosure.HG315: Security Analysis & Blue Team Operations
HG315: Security Analysis & Blue Team Operations provides students with comprehensive technical knowledge and key concepts required for security operation centre (SOC) analysts and new blue team members. By providing in-depth explanation of the mission and mindset of a modern cyber defence professional, this course jump-start with the tools common to a defender's work environment, and packs in all the essential and detailed explanations of SOC tools, processes, and data flow that every blue team member should understand.HG245: Wireless Penetration Test and Ethical Hacking
HG245 gives you the skills you need to understand the strengths and weaknesses weaknesses of wireless systems. In this course, you will learn how to evaluate the security of wireless networks and identify the Wi-Fi access points and client devices that threaten your organization; assess, attack, and exploit security loopholes in modern Wi-Fi deployments using WPA2 technology, along with sophisticated WPA2-Enterprise networks; use your knowledge of the many weaknesses in Wi-Fi protocols and apply it to modern wireless systems. Identify and attack Wi-Fi access points and exploit the behavioral differences in how client devices scan for, identify, and select access points.HG235: Cloud Penetration Testing & Ethical Hacking
HG235 will teach you cloud-focused pen-test techniques and how to assess modern cloud environments. This course dives deep into topics like containers, microservices, serverless functions, in-memory data stores, and Kubernetes meshes , as well as identifying and testing in cloud-first and cloud-native applications. You will also learn specific tactics and techniques for pen-testing in Microsoft Azure and Amazon AWS.HG225: Network Penetration Test & Ethical Hacking
With comprehensive coverage of security tools, techniques, and methodologies for network exploitation, HG225 truly prepares you to perform high-value pen-testing step by step. Every business requires skilled cyber security personnel who can discover vulnerabilities and mitigate them, and this entire training course is specially designed to get you ready for that role. The course starts with proper planning, scoping, and reconnaissance, then dives deep into network and vulnerability scanning, target exploitation, password attacks, Windows Domain attacks, and Azure Active Directory, with over 30+ hands-on labs. This training course is full of practical, real-world tips from some of the world's best pen-testers to help you do your job safely, efficiently, and skilfully.HG215: Web App Penetration Testing & Ethical Hacking
In HG215, you will learn the art of hacking & exploiting web applications to find security flaws in web apps. You'll learn about the attacker's tools and methods in order to be a more powerful cybersecurity professional. Through detailed, hands-on exercises and with guidance from the instructor, you will learn the four-step process for web application penetration testing; inject SQL commands into back-end databases to learn how hackers exfiltrate sensitive data; and utilise cross-site scripting (XSS) to dominate a target infrastructure. You will also explore various other web vulnerabilities using proven techniques and a structured security testing methods.