Defensive Security Courses
Coventry University via FutureLearn Comprehensive Introduction to Cyber Security
Udemy MacOS Dylib Injection through Mach-O Binary Manipulation
Malware Unicorn via Independent Registry Run Keys
Cybrary Fundamentals of Vulnerability Management
Cybrary Local Accounts
Cybrary Lateral Tool Transfer
Cybrary User Discovery
Cybrary Scheduled Task
Cybrary Obtain Capabilities: Tool
Cybrary