Step into the role of a digital investigator responding to a real-world email threat. In
Zenith
, you’ll analyze a suspicious PDF opened on a corporate system and uncover how attackers bypass security controls.
You’ll learn how to:
  • Investigate phishing attempts and email-borne malware
  • Analyze malicious PDFs and extract hidden payloads
  • Trace attacker actions through forensic artifacts
  • Apply reverse engineering to understand malware behavior
  • Strengthen detection and response workflows in Windows environments
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Want to add new defensive skills to your utility kit?
Login to HTB Labs today →
Zenith