Linux Essentials for Windows Users

Linux Essentials for Windows Users
English | Tutorial | Size: 124.3 MB


Learn the basics for using Windows Subsystem for Linux (WSL).

Linkedin Learning – Defeating Windows Defender

Linkedin Learning – Defeating Windows Defender
English | Tutorial | Size: 160.9 MB


The course explains the approach to malware detection in the Windows environment, and the way in which the Windows Defender anti-malware software uses the anti-malware service interface (AMSI) to stop penetration testing tools being used on Windows Workstations and Servers.

Windows Forensics with Belkasoft

Windows Forensics with Belkasoft
English | Tutorial | Size: 11.42 GB


This course is designed for digital forensics investigators who deal with Windows computers in their work. It offers an opportunity to enhance your knowledge and gain hands-on experience in discovering and analyzing Windows artifacts.

[Update] Links] RED TEAM Operator Windows Persistence Course – Sektor7


RED TEAM Operator: Windows Persistence Course – Sektor7
English | Size: 793.80 MB
Category: Tutorial

Welcome to Persistence in Windows course!
Real threat actors utilize various Tactics, Techniques and Procedures (aka TTPs). One of the tactic is Persistence – a way to survive a breached machine restart and preserve access to a target environment. There is a lot of focus on what methods adversaries use to exploit a particular vulnerability or how their C2 channels and infrastructure look like. Less often you find discussions about persistence. This course is aiming to change that.