دسته: Security Education

SEC595 empowers cybersecurity professionals to leverage data science, artificial intelligence (AI), and machine learning (ML) to enhance threat detection, incident response, and security automation. This course provides a practical, hands-on approach to applying data-driven techniques for analyzing security data, identifying anomalies, and building predictive models. Participants will learn to work with popular tools and frameworks, explore real-world datasets, and develop ML models to solve cybersecurity challenges such as intrusion detection, malware classification, and phishing detection. SEC595 bridges the gap between data science and cybersecurity, equipping professionals with cutting-edge skills to tackle modern threats effectively.

ادامه مطلب

SEC550 explores the art and science of cyber deception as a proactive strategy for detecting, disrupting, and defending against adversaries. Participants will learn to design and implement deception technologies, such as honeypots, honey tokens, and decoy systems, to mislead attackers and gather actionable intelligence. The course covers strategies for embedding deception across networks, cloud environments, and applications, enabling organizations to detect threats early and minimize the impact of attacks. Through hands-on labs and real-world scenarios, SEC550 equips security professionals with innovative tools and techniques to outmaneuver attackers and strengthen their overall security posture.

ادامه مطلب

SEC661 is a specialized course focused on advanced exploitation techniques for ARM-based architectures. Tailored for experienced security professionals, the course delves into the intricacies of ARM assembly, reverse engineering, and vulnerability discovery. Participants will explore real-world exploitation scenarios, including stack overflows, return-oriented programming (ROP), and bypassing modern mitigation techniques like DEP and ASLR on ARM systems. With hands-on labs and detailed guidance, SEC661 prepares attendees to analyze and exploit vulnerabilities in IoT devices, mobile platforms, and embedded systems, equipping them with the skills to defend against sophisticated attacks targeting ARM-based technologies.

ادامه مطلب

SEC566 provides a practical guide to implementing and auditing the Center for Internet Security (CIS) Critical Security Controls (CIS Controls). This course is designed to help organizations improve their cybersecurity posture by effectively prioritizing and deploying the CIS Controls framework. Participants will learn how to assess current security practices, identify gaps, and align them with CIS guidelines to reduce risk. The course also covers techniques for auditing the implementation of controls to ensure compliance and effectiveness. Through hands-on exercises and real-world scenarios, SEC566 equips security professionals with actionable strategies to strengthen defenses and achieve measurable improvements in cybersecurity.

ادامه مطلب

SEC537 provides hands-on training in open-source intelligence (OSINT) gathering, analysis, and automation techniques. This course teaches participants how to collect actionable intelligence from publicly available sources, such as websites, social media, forums, and databases, while adhering to ethical and legal standards. Students will also explore tools and scripting methods to automate OSINT workflows, enabling efficient large-scale data collection and analysis. Real-world scenarios and exercises demonstrate how OSINT can be applied to threat intelligence, investigations, and risk assessments. SEC537 equips professionals with the skills to uncover critical information, gain insights, and enhance decision-making in cybersecurity and beyond.

ادامه مطلب

SEC487 is a foundational course focused on collecting, analyzing, and leveraging publicly available information for cybersecurity, investigations, and decision-making. Participants will learn techniques to gather OSINT from various sources, including social media, public records, websites, and dark web platforms, while maintaining ethical and legal compliance. The course emphasizes manual and automated methods for identifying and interpreting critical data. Through hands-on exercises and real-world case studies, SEC487 equips students with the skills to apply OSINT in threat intelligence, vulnerability assessments, and incident response, enabling professionals to uncover valuable insights and protect against evolving threats.

ادامه مطلب