|
5 - Security Management: Threat Detection Management II
|
0.1: New-Scale CTF |
25 |
|
|
4 - Security Management: Threat Detection Management I
|
0.1: New-Scale CTF |
25 |
|
|
3 - Security Management: Attack Surface Insights II
|
0.1: New-Scale CTF |
10 |
|
|
2 - Security Management: Attack Surface Insights I
|
0.1: New-Scale CTF |
10 |
|
|
1 - Platform Overview: Start Here!
|
0.1: New-Scale CTF |
5 |
|
|
BH Challenge 13
|
0: Black Hat 2025 |
10 |
|
|
BH Challenge 12
|
0: Black Hat 2025 |
20 |
|
|
BH Challenge 11
|
0: Black Hat 2025 |
10 |
|
|
BH Challenge 10
|
0: Black Hat 2025 |
15 |
|
|
BH Challenge 8
|
0: Black Hat 2025 |
15 |
|
|
BH Challenge 9
|
0: Black Hat 2025 |
10 |
|
|
BH Challenge 7
|
0: Black Hat 2025 |
20 |
|
|
BH Challenge 6
|
0: Black Hat 2025 |
15 |
|
|
BH Challenge 5
|
0: Black Hat 2025 |
20 |
|
|
BH Challenge 4
|
0: Black Hat 2025 |
20 |
|
|
BH Challenge 3
|
0: Black Hat 2025 |
15 |
|
|
BH Challenge 2
|
0: Black Hat 2025 |
20 |
|
|
BH Challenge 1
|
0: Black Hat 2025 |
10 |
|