Courses
Pathway to Pentesting
Pentesting Practitioner (CSTM)
CREST Registered Penetration Tester
Advanced Application Testing
Advanced Infrastructure Testing
Solutions
Upskill IT Professionals
Hire Better Candidates
Unlock Your Career Potential
Business Leaders
SMEs
Cyber Security Teams
Consulting
Technical Assessment
Cyber Security as a Service
Managed Cyber Security Services
Resource Centre
About us
Our Story
Our Trainers
Pricing
Join our community
Become a Partner
Academy
Contact
Resource Centre
Wherever you are on your learning path, we have got you covered.
Articles
Case
Studies
E-books
Guides
Videos
E-Books
Setting up your own testing lab environment
How to Start Your Career In Penetration Testing
How to identify and exploit XSS vulnerabilities
See more e-books
Videos
Installing Nessus
Installing Kali
Downloading Kali
nmap
DNS Reverse Lookup
GDPR
Guides
Improve your pentesting skills – our intentionally insecure web app
How to use Nmap: a guide and cheat sheet
An Introduction to Linux for Penetration Testers
See more guides
Articles
Exploiting NFS: understanding misconfigurations and attack vectors
Pivoting with SSH tunnels
Attacking DNS for pentesters
See more articles
Case Studies
Information Risk Management (IRM)
Vertical Structure
MTI