Want to master your topic faster? Let AI build your personalized course

📚 Smarter courses, 🔍 adaptive quizzes, 🎓 real certificates.

Build Custom Course

Free HTB Academy Courses online

image

Penetration Tester Job Role Path

After finishing this job role route, you will have the practical abilities and mentality required to undertake professional security assessments against enterprise-level infrastructure at an intermediate level.

image

Active Directory Enumeration Skills Path

Active Directory (AD) is widely utilized by businesses from all industries, non-profits, government agencies, and educational institutions of all kinds. AD, by definition, is easily misconfigured and contains numerous fundamental weaknesses and well-known vulnerabilities.

image

Bug Bounty Hunter

The Bug Bounty Hunter Job Role Path is for people who wish to get started in Bug Bounty Hunting but have little to no experience.

image

Local Privilege Escalation Skills Path

This course covers the fundamental concepts of local privilege escalation required for success against Windows and Linux systems. The path includes manual enumeration and exploitation, as well as the use of tools to facilitate the process.

image

Intro to Binary Exploitation Skills Path

Binary exploitation is a fundamental aspect of penetration testing, but learning it can be challenging. This is primarily due to the complexity of binary files and their underlying machine code, as well as their interactions with computer memory and the CPU.

image

Operating System Fundamentals Skills Path

To succeed in information security, we must have a deep understanding of the Windows and Linux operating systems and be comfortable navigating the command li...