8. Network Communication Devices

5. Connectivity Verification, Address Resolution Protocol and The Transport Layer

35. SOC , SIEM , Isolate Compromised Host Using 5-Tuple Lab

4. Network Protocols , Ethernet and Internet Protocol

18. Denial of Service Attack& Countermeasures

10. Common Threats and Attacks

21. Steganography using image file

38. Advanced Network Scanning Part3

24. Trojan, Backdoor &Virus & Countermeasures

29. Command Injection in Web Application

34. vulnerability scanning and penetration testing

33. SQL Injection in Web Application

31. XSS Reflected in Web Application

32. XSS Store in Web Application

9. Attackers and Their Tools

15. Information Gathering & Countermeasures

36. Advanced Network Scanning Part1

37. Advanced Network Scanning Part2

41. Debugging Fundamentals for Pentesters

42. Memory Corruption part 1

43. Memory Corruption part 2

39. Software Exploitation Part1

40. Software Exploitation Part2

20. MAC Spoofing

25. Email Security

26. Configuring Host Based Firewall (Linux)

3. Linux Operating System part2

2. Linux Operating System part1

Learn Linux and Shell Scripting From Basic To Advanced

Reverse Engineering & Malware Analysis in 21 Hours REMAC+