Active Directory
Enterprise Domain Exploitation
Attacks
Exploitation Techniques & Methods
Blue Team
Defensive Security Strategies
Cloud
Cloud Security & Exploitation
Custom Tools
Bespoke Security Tooling
CVEs
Vulnerability Analysis & Exploits
Detection
Threat Detection Engineering
Evasion
Defense Evasion Techniques
External
External Network Testing
Internal
Internal Network Operations
Knowledge
Core Security Concepts
Linux
Linux Security & Administration
Malware
Malware Analysis & Development
Methodology
Testing Frameworks & Processes
Networking
Network Security Fundamentals
Operational Technology
ICS & SCADA Security
OSINT
Open Source Intelligence Gathering
Phishing
Social Engineering Campaigns
Pivoting
Network Pivoting Techniques
PowerShell
PowerShell Offensive Scripting
Programming
Security Tool Development
Protocols
Protocol Analysis & Exploitation
Red Team
Offensive Security Operations
Research
Security Research & Analysis
Technologies
Security Technologies Overview
Tools
Security Tools & Utilities
Web
Application Security Testing
Windows
Windows Security & Exploitation