دسته: دوره ها

SEC670 dives deep into the art of Red Team operations, focusing on the development of custom tools for Windows environments. Participants will learn how to craft stealthy, highly effective tools to bypass modern defenses, evade detection, and simulate real-world adversary techniques. Through hands-on labs and expert-led instruction, students will explore low-level programming, process injection, API hooking, and more. Ideal for penetration testers, Red Teamers, and security researchers, this course equips professionals with the skills to create undetectable attack frameworks, ensuring they stay ahead in the evolving cybersecurity landscape.

ادامه مطلب

DevOps has revolutionised the traditional software delivery lifecycle resulting in faster product delivery, faster issue resolution, greater scalability, and more automation. Throughout this course, you will learn how DevOps practices can bring similar benefits to your penetration testing and red team operations.

ادامه مطلب

The AI Red Teamer Job Role Path, in collaboration with Google, trains cybersecurity professionals to assess, exploit, and secure AI systems. Covering prompt injection, model privacy attacks, adversarial AI, supply chain risks, and deployment threats, it combines theory with hands-on exercises. Aligned with Google’s Secure AI Framework (SAIF), it ensures relevance to real-world AI security challenges. Learners will gain skills to manipulate model behaviors, develop AI-specific red teaming strategies, and perform offensive security testing against AI-driven applications. The path will be gradually expanded with related modules until its completion.

ادامه مطلب

Threat Hunting in Microsoft Sentinel and Defender course by MalTrak is designed to equip cybersecurity professionals with the skills to detect and respond to advanced threats using Microsoft’s security tools. This training emphasizes practical, hands-on experience in leveraging Microsoft Sentinel and Defender for effective threat hunting and incident response.

ادامه مطلب

This course provides a beginner-level introduction to the tools and methodologies used to perform malware analysis on executables found in Windows systems using a practical, virtual hands-on approach. The course introduces students to Disassembly, including subtopics on x86 Architecture, The Stack, C Code Constructs, and an introduction to IDA Pro. The content is developed and taught by FLARE malware analysts who are experienced in analyzing a diverse set of malware.

ادامه مطلب
Starting with fundamental principles, Investigating Linux Devices rapidly progresses to encompass log analysis, file systems, persistence mechanisms, memory forensics, live response, and more! This course offers extensive hands-on practice and a capstone involving the analysis of a compromised system. Tailored for both beginners and seasoned professionals, it serves as an ideal resource for mastering Linux forensics!

ادامه مطلب