h1
Your cybersecurity journey starts here.
h2
Get certified with HTB
h2
Learn cybersecurity, invest in your future career skills
h3
Cracking into Hack the Box
h3
Local Privilege Escalation
h3
Intro to Binary Exploitation
h3
Operating System Fundamentals
h3
CREST CPSA/CRT Preparation
h3
CREST CCT APP Preparation
h3
Information Security Foundations
h3
CREST CCT INF Preparation
h3
Active Directory Enumeration
h3
Introduction to Academy
h3
Introduction to Bash Scripting
h3
DNS Enumeration Using Python
h3
Introduction to Networking
h3
Introduction to Active Directory
h3
Introduction to Web Applications
h3
Intro to Network Traffic Analysis
h3
Intro to Assembly Language
h3
Introduction to Python 3
h3
Penetration Testing Process
h3
Incident Handling Process
h3
Bug Bounty Hunting Process
h3
Documentation & Reporting
h3
Introduction to Windows Command Line
h3
Brief Intro to Hardware Attacks
h3
Network Enumeration with Nmap
h3
Cracking Passwords with Hashcat
h3
OSINT: Corporate Recon
h3
Stack-Based Buffer Overflows on Linux x86
h3
SQL Injection Fundamentals
h3
Using the Metasploit Framework
h3
Whitebox Pentesting 101: Command Injection
h3
Linux Privilege Escalation
h3
Attacking Web Applications with Ffuf
h3
Windows Privilege Escalation
h3
Active Directory PowerView
h3
Active Directory BloodHound
h3
Stack-Based Buffer Overflows on Windows x86
h3
Cross-Site Scripting (XSS)
h3
Vulnerability Assessment
h3
Attacking Common Applications
h3
Attacking Common Services
h3
Active Directory Enumeration & Attacks
h3
Information Gathering - Web Edition
h3
Pivoting, Tunneling, and Port Forwarding
h3
Web Service & API Attacks
h3
Attacking Enterprise Networks
h3
Introduction to Deserialization Attacks
h3
Attacking Authentication Mechanisms
h3
Introduction to NoSQL Injection
h3
Game Hacking Fundamentals
h3
Advanced SQL Injections
h3
Abusing HTTP Misconfigurations
h3
Secure Coding 101: JavaScript
h3
JavaScript Deobfuscation
h3
Windows Attacks & Defense
h3
Security Monitoring & SIEM Fundamentals
h3
Introduction to Threat Hunting & Hunting With Elastic
h3
Windows Event Logs & Finding Evil
h3
Understanding Log Sources & Investigating with Splunk
h3
Introduction to Malware Analysis
h3
HTB Certified Penetration Testing Specialist
h3
HTB Certified Bug Bounty Hunter
h3
In-browser Pentesting VM