Illuminati Party

We offer hundreds of courses in Cybersecurity, IT, Soft Skills, and Management and we’re adding more all the time. Please use the search bar or filter by topic and/or skill level to find your content and get started!

  • Topics

  • Skill Level

ARM-32 COURSE 1

By Illuminati Party
25 Lessons

Reverse Engineering For Everyone! — by @mytechnotalent    Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only […]

ARM-32 COURSE 2

By Illuminati Party
49 Lessons

Reverse Engineering For Everyone! by @mytechnotalent    Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]

ARM-64 Course

By Illuminati Party
20 Lessons

Reverse Engineering For Everyone! by @mytechnotalent    Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]

Pico Hacking Course

By Illuminati Party
20 Lessons

Reverse Engineering For Everyone! by @mytechnotalent    Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]

Security Operations Center Analyst, Tier 1

Course Overview The field of Information Security deals with the ever-growing volume of threats to businesses and government entities. While hardening computer and network infrastructure with patching, firewalls, and intrusion protection systems is important, those tools will probably never stop the threats completely. Role of the SOC Analyst Adept individuals are needed to monitor the […]

Security Operations Center Analyst, Tier 2

Course Overview A Tier 2 security operations center (SOC) analyst takes the lead investigating complex information security incidents, which are often escalated by more junior analysts. Their work includes collecting, analyzing, and preserving digital evidence, as well as ensuring that incidents are appropriately recorded, tracked and reported. In many organizations their job also includes proactively […]

X64 Course

By Illuminati Party
43 Lessons

Reverse Engineering For Everyone! by @mytechnotalent    Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]

X86 Course

By Illuminati Party
40 Lessons

Reverse Engineering For Everyone! by @mytechnotalent    Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]