tech.bitvijays.com

The Essentials

  • Cybersecurity in an Enterprise
  • Linux Basics
  • Cloud Infrastructure Technologies
  • Open Source Concepts
  • Secure Software Development Fundamentals

Infrastructure Pentest

  • Intelligence Gathering
  • Vulnerability Analysis
  • Exploitation
  • Post Exploitation
  • Reporting
  • Configuration Review

Vulnerable Machines

  • Initial Recon
  • From Nothing to a Unprivileged Shell
  • Unprivileged Shell to Privileged Shell
  • Tips and Tricks
  • Appendix

CTF - Challenges

  • Binary Exploitation
  • Forensics
  • Reverse Engineering
  • Cryptography
  • Coding Quick Reference

Critical Infrastructure

  • Industrial Control Systems
  • Electrical Grid
tech.bitvijays.com
  • Search


© Copyright Vijay Kumar & Contributors.