More than 95 percent of Fortune 500 use Azure today! A huge number of organizations use Azure AD (Entra ID) as an Identity and Access Management platform. This makes it imperative to understand the risks associated with Azure as it contains an enterprises infrastructure, apps, identities and a lot more!

In addition to cloud-only identity, the ability to connect on-prem Active Directory, applications and infrastructure to Azure AD brings some very interesting opportunities and risks too. Often complex to understand, this setup of components, infrastructure and identity is a security challenge.

ادامه مطلب

AI Hacking 101 teaches students the fundamentals of penetration testing for AI/LLM-based applications through self-paced video instruction and guided hands-on labs. Students will learn to detect and exploit common AI vulnerabilities, with practical exercises using a custom-built lab environment featuring a vulnerable chatbot that uses Retrieval-Augmented Generation (RAG) and integrates with a company knowledge base.

ادامه مطلب

This course is designed to introduce students to the fundamentals of AI including neural networks and transformer large language models (LLMs). Beginning with the math behind neural networks and how they are trained, students will learn how these networks are used for natural language processing and the architecture of modern transform LLMs, providing a full picture of how neural networks and LLMs actually work. This course does not focus on how to use AI tools.

ادامه مطلب

Have you ever felt your windows operating system is hung or becoming slow or having a BSOD? Or an application crash or application hang or slow on windows? Have you had to press the restart button of your PC or the windows server to get rid of the problem and had no clue when that issue will happen again? Or you’re asked to analyse a memory dump of a compromised system for isolating a malware?. If that bothers you, this training is all about root causing and solving such complicated issues once and for all, among many other topics it covers. Windbg is the single most powerful, debugging and reverse engineering tool in windows platform. Windbg is like an x-ray plus mri plus ct scan for programs running on windows operating system, including the operating system itself. It helps us to root cause complicated problems like we discussed in windows ( OS ) and programs running inside the operating system.

ادامه مطلب

This course is designed for digital forensics investigators who deal with Windows computers in their work. It offers an opportunity to enhance your knowledge and gain hands-on experience in discovering and analyzing Windows artifacts.

ادامه مطلب

 Learn how to trace Bitcoin, Ethereum, and Monero transactions using real-world blockchain forensics and crypto investigation techniques. This course is designed for cybersecurity professionals, law enforcement, compliance officers, and blockchain analysts who want to follow the money across crypto networks.

ادامه مطلب