Search this site
Embedded Files
Skip to main content
Skip to navigation
James Lassiter, MPA, B.S., CSIL-CI
About
Education/Training
Higher Education
CHEC
FEMA
TEEX
Cybersecurity
CSIL-CI
Hack The Box Academy
NRA
Notary
Desert Notary
Contact a Notary
Connect
James Lassiter, MPA, B.S., CSIL-CI
About
Education/Training
Higher Education
CHEC
FEMA
TEEX
Cybersecurity
CSIL-CI
Hack The Box Academy
NRA
Notary
Desert Notary
Contact a Notary
Connect
More
About
Education/Training
Higher Education
CHEC
FEMA
TEEX
Cybersecurity
CSIL-CI
Hack The Box Academy
NRA
Notary
Desert Notary
Contact a Notary
Connect
Completed Intro to Academy
Your first stop in Hack The Box Academy to become acquainted with the platform, its features, and its learning process.
Completed Learning Process
The learning process is one of the essential and most important components that is often overlooked. This module does not teach you techniques to learn but describes the process of learning adapted to the field of information security. You will learn to understand how and when we learn best and increase and improve your learning efficiency greatly.
Completed Getting Started
This module covers the fundamentals of penetration testing and an introduction to Hack The Box.
Completed Setting Up
This module covers topics that will help us be better prepared before conducting penetration tests. Preparations before a penetration test can often take a lot of time and effort, and this module shows how to prepare efficiently.
Completed Windows Fundamentals
This module covers the fundamentals required to work comfortably with the Windows operating system.
Completed Linux Fundamentals
This module covers the fundamentals required to work comfortably with the Linux operating system and shell.
Completed MacOS Fundamentals
This module covers the fundamentals required to work comfortably within the macOS operating system and shell.
Completed Incident Handling Process
Security Incident handling has become a vital part of each organization's defensive strategy, as attacks constantly evolve and successful compromises are becoming a daily occurrence. In this module, we will review the process of handling an incident from the very early stage of detecting a suspicious event, to confirming a compromise and responding to it.
Completed Introduction to Web Applications
In the Introduction to Web Applications module, you will learn all of the basics of how web applications work and begin to look at them from an information security perspective.
Completed Introduction to Active Directory
Active Directory (AD) is present in the majority of corporate environments. Due to its many features and complexity, it presents a vast attack surface. To be successful as penetration testers and information security professionals, we must have a firm understanding of Active Directory fundamentals, AD structures, functionality, common AD flaws, misconfigurations, and defensive measures.
Completed Introduction to Windows Command Line
As administrators and Pentesters, we may not always be able to utilize a graphical user interface for the actions we need to perform. Introduction to Windows Command Line aims to introduce students to the wide range of uses for Command Prompt and PowerShell within a Windows environment. We will cover basic usage of both key executables for administration, useful PowerShell cmdlets and modules, and different ways to leverage these tools to our benefit.
Completed Security Incident Reporting
Tailored to provide a holistic understanding, this Hack The Box Academy module ensures participants are adept at identifying, categorizing, and documenting security incidents with utmost accuracy and professionalism. The module meticulously breaks down the elements of a robust incident report and then presents participants with a real-world incident report, offering practical insights into the application of the concepts discussed.
Completed Intro to Network Traffic Analysis
Network traffic analysis is used by security teams to monitor network activity and look for anomalies that could indicate security and operational issues. Offensive security practitioners can use network traffic analysis to search for sensitive data such as credentials, hidden applications, reachable network segments, or other potentially sensitive information "on the wire." Network traffic analysis has many uses for attackers and defenders alike.
Completed Introduction to Bash Scripting
This module covers the basics needed for working with Bash scripts to automate tasks on Linux systems. A strong grasp of Bash is a fundamental skill for anyone working in a technical information security role. Through the power of automation, we can unlock the Linux operating system's full potential and efficiently perform habitual tasks.
Completed Penetration Testing Process
This module teaches the penetration testing process broken down into each stage and discussed in detail. We will cover many aspects of the role of a penetration tester during a penetration test, explained and illustrated with detailed examples. The module also covers pre-engagement steps like the criteria for establishing a contract with a client for a penetration testing engagement.
Completed Web Requests
This module introduces the topic of HTTP web requests and how different web applications utilize them to communicate with their backends.
Completed Introduction to Networking
As an information security professional, a firm grasp of networking fundamentals and the required components is necessary. Without a strong foundation in networking, it will be tough to progress in any area of information security. Understanding how a network is structured and how the communication between the individual hosts and servers takes place using the various protocols allows us to understand the entire network structure and its network traffic in detail and how different communication standards are handled. This knowledge is essential to create our tools and to interact with the protocols.
Completed Brief Intro to Hardware Attacks
This mini-module concisely introduces hardware attacks, covering Bluetooth risks and attacks, Cryptanalysis Side-Channel Attacks, and vulnerabilities like Spectre and Meltdown. It delves into both historical and modern Bluetooth hacking techniques, explores the principles of cryptanalysis and different side-channel attacks, and outlines microprocessor design, optimisation strategies and vulnerabilities, such as Spectre and Meltdown.
Completed JavaScript Deobfuscation
This module will take you step-by-step through the fundamentals of JavaScript Deobfuscation until you can deobfuscate basic JavaScript code and understand its purpose.
SKILL PATHS
Completed Operating System Fundamentals
To succeed in information security, we must have a deep understanding of the Windows and Linux operating systems and be comfortable navigating the command line on both as a "power user." Much of our time in any role, but especially penetration testing, is spent in a Linux shell, Windows cmd or PowerShell console, so we must have the skills to navigate both types of operating systems with ease, manage system services, install applications, manage permissions, and harden the systems we work from in accordance with security best practices.
Completed Information Security Foundations
Information Security is a field with many specialized and highly technical disciplines. Job roles like Penetration Tester & Information Security Analyst require a solid technical foundational understanding of core IT & Information Security topics. This skill path is made up of modules that will assist learners in developing &/or strengthening a foundational understanding before proceeding with learning the more complex security topics. Every long-standing building first needs a solid foundation. Welcome to Information Security Foundations.
Completed Cracking into Hack the Box
To be successful in any technical information security role, we must have a broad understanding of specialized tools, tactics, and terminology. This path introduces core concepts necessary for anyone interested in a hands-on technical infosec role. The modules also provide the essential prerequisite knowledge for joining the main Hack The Box platform, progressing through Starting Point through easy-rated retired machines, and solving "live" machines with no walkthrough. It also includes helpful information about staying organized, navigating the HTB platforms, common pitfalls, and selecting a penetration testing distribution. Students will complete their first box during this path with a guided walkthrough and be challenged to complete a box on their own by applying the knowledge learned in the Getting Started module.
Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse