دسته: دوره ها

SEC467 equips security professionals with the knowledge and skills to recognize, prevent, and respond to social engineering attacks. This course delves into the psychological tactics used by attackers to manipulate individuals into divulging confidential information or compromising security systems. Through real-world scenarios and practical exercises, participants will learn to identify phishing, pretexting, baiting, and tailgating attacks, and develop effective countermeasures. SEC467 also covers ethical considerations and legal implications, providing a comprehensive understanding of social engineering threats in both organizational and personal contexts, helping professionals safeguard against these subtle yet highly effective attack methods.

ادامه مطلب

SEC587 provides an in-depth exploration of advanced techniques for gathering and analyzing open-source intelligence (OSINT) in cybersecurity. The course teaches participants how to effectively leverage publicly available data—from social media and websites to government databases and deep web sources—to uncover potential security threats and vulnerabilities. Students will learn how to use OSINT tools for real-time threat intelligence, competitor analysis, and threat actor profiling. Emphasizing practical, hands-on exercises, SEC587 enhances the ability to conduct in-depth investigations, identify attack vectors, and anticipate cyber threats, all while adhering to legal and ethical standards.

ادامه مطلب

SEC554 explores the rapidly evolving world of blockchain technology and its security implications, focusing on securing decentralized applications (dApps) and smart contracts. Participants will gain an understanding of blockchain architectures, consensus mechanisms, and cryptographic principles, along with the vulnerabilities that can exist within blockchain networks and smart contracts. Through practical labs, students will learn to identify and mitigate risks such as reentrancy attacks, transaction malleability, and gas limit vulnerabilities. SEC554 prepares professionals to secure blockchain ecosystems, ensuring the integrity of decentralized applications and protecting against emerging threats in blockchain-based environments.

ادامه مطلب

SEC530 offers a comprehensive approach to designing and implementing a Zero Trust security model within hybrid enterprise environments. This course emphasizes the importance of security architecture in mitigating modern threats by assuming that every user, device, and application could be compromised. Participants will explore Zero Trust principles, including identity and access management, micro-segmentation, continuous monitoring, and least-privilege access. Through hands-on labs and case studies, students will learn to implement these concepts across hybrid infrastructures, ensuring robust defenses and minimizing the attack surface. SEC530 prepares security professionals to create and maintain resilient, adaptive security architectures aligned with the latest industry standards and best practices.

ادامه مطلب

SEC510 provides a deep dive into securing public cloud infrastructures, focusing on the top three platforms: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). The course covers key security challenges unique to the cloud, such as identity and access management (IAM), data protection, network security, and compliance across these environments. Participants will learn to assess and mitigate risks, implement best practices, and leverage native cloud security tools for threat detection and incident response. Through hands-on exercises and real-world case studies, SEC510 equips security professionals with the skills to protect and secure critical cloud-based resources in multi-cloud and hybrid cloud environments.

ادامه مطلب

SEC505 teaches security professionals how to secure Windows environments and automate security tasks using PowerShell while maintaining robust protection against internal and external threats. The course explores techniques for hardening Windows systems, securing PowerShell scripts, and detecting malicious automation. Participants will gain practical experience in securing automation workflows, managing administrative privileges, and mitigating common attack vectors like PowerShell-based exploits. With hands-on labs and real-world examples, SEC505 enables attendees to effectively secure Windows environments, automate incident response, and safeguard against advanced threats that target Windows systems and PowerShell automation.

ادامه مطلب