دسته: دوره ها

MGT516 is designed to help security leaders develop, implement, and manage effective vulnerability management programs that protect organizations from emerging threats. The course covers the entire vulnerability lifecycle, from identification and assessment to remediation and mitigation strategies. Participants will learn how to prioritize vulnerabilities based on risk, integrate vulnerability management into broader security operations, and measure the effectiveness of their programs. Through hands-on exercises and case studies, MGT516 equips professionals with the skills to lead cross-functional teams, communicate risks effectively to stakeholders, and continuously improve vulnerability management processes to reduce the organization’s attack surface.

ادامه مطلب

MGT433 focuses on understanding and managing the human element in cybersecurity, recognizing that employees, contractors, and third-party vendors can be the weakest link in an organization’s security posture. The course explores the psychology of human behavior, common security risks posed by insiders, and how to mitigate them through training, awareness programs, and behavior-driven security policies. Participants will learn how to develop and implement strategies to reduce human risk, including phishing prevention, social engineering defenses, and fostering a security-aware culture. Through practical case studies and exercises, MGT433 equips leaders with the tools to manage human risk effectively and enhance overall organizational resilience.

ادامه مطلب

ICS515 is a hands-on course designed to equip cybersecurity professionals with the skills needed to detect, analyze, and respond to threats targeting Industrial Control Systems (ICS) and Operational Technology (OT) environments. The course covers key topics such as network visibility, threat intelligence, incident detection, and forensic analysis specific to critical infrastructure sectors like energy, manufacturing, and transportation. Participants will learn how to implement and optimize monitoring solutions, analyze ICS network traffic, and develop response strategies to mitigate cyber threats. Through real-world scenarios and hands-on labs, ICS515 prepares defenders to enhance the security and resilience of industrial environments against evolving cyber risks.

ادامه مطلب

ICS410 provides foundational knowledge and practical skills for securing Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) environments. The course covers ICS architectures, protocols, risk management frameworks, and common attack vectors targeting critical infrastructure. Participants will learn essential security controls, incident response strategies, and best practices for securing industrial networks. With hands-on labs and real-world case studies, ICS410 equips IT and OT professionals with the expertise needed to protect ICS/SCADA environments from cyber threats while ensuring operational reliability and safety.

ادامه مطلب

SEC503 is an advanced course designed to help security professionals master network monitoring, intrusion detection, and threat analysis. The course covers essential topics such as packet analysis, network forensics, SIEM optimization, and anomaly detection techniques. Participants will learn how to detect and respond to cyber threats by analyzing network traffic, logs, and attack patterns. The course also dives into advanced tactics used by attackers, including evasion techniques and encrypted traffic analysis. Through hands-on labs and real-world scenarios, SEC503 equips security analysts, SOC teams, and incident responders with the skills needed to enhance network visibility, improve detection capabilities, and respond effectively to cyber threats.

ادامه مطلب

Smart Contract Hacking is a comprehensive online course that teaches you how to secure, hack, and use blockchain and smart contract technology. The course covers the fundamentals of blockchain, the popular Ethereum coding language Solidity, and the tools and techniques for auditing and exploiting smart contracts. You will learn how to deploy, scan, and test various blockchain implementations and protocols, such as Bitcoin, Ethereum, Solana, Cosmos, Near, NFTs, DeFi, and Web3. You will also get access to hands-on exercises, challenges, and quizzes to reinforce your learning and gain practical experience. By the end of the course, you will have the skills and knowledge to become a proficient web3 security professional.

Syllabus

Intro
Career Paths
EVM
Environment & Dev Tools
Exercises Guidelines
Tokens crash course: ERC20
Tokens crash course: ERC721
ReEntrsncy Attacks
Arithmetic over/underflow
Phishing Attacks
Randomness Vulnerabilities
Access Control & Default Visibility
DEFI Crash Course: DEXes
DEFI Crash Course: Money Markets
Replay Attacks
Flash Loans & Flash Swaps
Flash Loan Attacks
Denial of Service
Sensitive On-Chain Data
Unchecked Return Value
Frontrunning
DAO & Governance Attacks
Oracle Manipulation
Call / Delegate call Attacks

Smart Contract Hacking Course

ادامه مطلب