دسته: Security Education

SEC201 is an entry-level course designed to provide a strong foundation in computing and technology concepts essential for cybersecurity professionals. The course covers fundamental topics such as computer hardware, operating systems, networking, and basic programming principles. Participants will also explore key cybersecurity concepts, including threat identification, basic encryption, and safe computing practices. Through practical exercises and real-world examples, SEC201 equips attendees with the essential technical knowledge and skills needed to succeed in more advanced cybersecurity training and roles, making it an ideal starting point for individuals new to the field.

ادامه مطلب

SEC595 empowers cybersecurity professionals to leverage data science, artificial intelligence (AI), and machine learning (ML) to enhance threat detection, incident response, and security automation. This course provides a practical, hands-on approach to applying data-driven techniques for analyzing security data, identifying anomalies, and building predictive models. Participants will learn to work with popular tools and frameworks, explore real-world datasets, and develop ML models to solve cybersecurity challenges such as intrusion detection, malware classification, and phishing detection. SEC595 bridges the gap between data science and cybersecurity, equipping professionals with cutting-edge skills to tackle modern threats effectively.

ادامه مطلب

SEC550 explores the art and science of cyber deception as a proactive strategy for detecting, disrupting, and defending against adversaries. Participants will learn to design and implement deception technologies, such as honeypots, honey tokens, and decoy systems, to mislead attackers and gather actionable intelligence. The course covers strategies for embedding deception across networks, cloud environments, and applications, enabling organizations to detect threats early and minimize the impact of attacks. Through hands-on labs and real-world scenarios, SEC550 equips security professionals with innovative tools and techniques to outmaneuver attackers and strengthen their overall security posture.

ادامه مطلب

SEC661 is a specialized course focused on advanced exploitation techniques for ARM-based architectures. Tailored for experienced security professionals, the course delves into the intricacies of ARM assembly, reverse engineering, and vulnerability discovery. Participants will explore real-world exploitation scenarios, including stack overflows, return-oriented programming (ROP), and bypassing modern mitigation techniques like DEP and ASLR on ARM systems. With hands-on labs and detailed guidance, SEC661 prepares attendees to analyze and exploit vulnerabilities in IoT devices, mobile platforms, and embedded systems, equipping them with the skills to defend against sophisticated attacks targeting ARM-based technologies.

ادامه مطلب

SEC566 provides a practical guide to implementing and auditing the Center for Internet Security (CIS) Critical Security Controls (CIS Controls). This course is designed to help organizations improve their cybersecurity posture by effectively prioritizing and deploying the CIS Controls framework. Participants will learn how to assess current security practices, identify gaps, and align them with CIS guidelines to reduce risk. The course also covers techniques for auditing the implementation of controls to ensure compliance and effectiveness. Through hands-on exercises and real-world scenarios, SEC566 equips security professionals with actionable strategies to strengthen defenses and achieve measurable improvements in cybersecurity.

ادامه مطلب

SEC537 provides hands-on training in open-source intelligence (OSINT) gathering, analysis, and automation techniques. This course teaches participants how to collect actionable intelligence from publicly available sources, such as websites, social media, forums, and databases, while adhering to ethical and legal standards. Students will also explore tools and scripting methods to automate OSINT workflows, enabling efficient large-scale data collection and analysis. Real-world scenarios and exercises demonstrate how OSINT can be applied to threat intelligence, investigations, and risk assessments. SEC537 equips professionals with the skills to uncover critical information, gain insights, and enhance decision-making in cybersecurity and beyond.

ادامه مطلب