دسته: دوره ها

Enterprises have been working tirelessly to improve their security postures through defense-in-depth approaches. Offensive teams have also been putting in long hours of research into bypassing the latest EDR’s and defensive products that keep them on their toes. Long gone “hopefully” are the days of hurdling an HTA file laced with a download cradle at a mature organization with a “Free iPad” ruse and watching your screen fill with incoming agents. An offense-in-depth approach may be applied to offensive practitioner’s looking for success against organizations well-versed in defending a large enterprise. Today’s organizations have assets in multiple geo regions, networks, cloud services, border hosts, and many of them are tied to the internal network in some way. This course aims to help offensive practitioners successfully exercise their client environments from a multi-faceted approach using the latest TTPs blended with esoteric practices to gain the upper hand on your assessments.

Antisyphon: Enterprise Attack Initial Access w/ Steve Borosh

ادامه مطلب

SEC455 designed to teach professionals how to build a Security Information and Event Management (SIEM) system from the ground up using the Elastic Stack.

ادامه مطلب

SEC455 designed to teach professionals how to build a Security Information and Event Management (SIEM) system from the ground up using the Elastic Stack.

ادامه مطلب

MGT512: Security Leadership Essentials for Managers designed to equip security leaders with both technical knowledge and leadership skills essential for managing modern security programs.

ادامه مطلب

This course is designed to provide forensic professionals with specialized techniques to analyze and investigate smartphones thoroughly. With mobile devices playing a significant role in daily communications, they often become key evidence sources in criminal, civil, or corporate investigations.

ادامه مطلب

FOR526 is a specialized course designed to equip digital forensics examiners and incident responders with the skills necessary to perform in-depth memory analysis and effectively detect threats.

ادامه مطلب