In this course, we’ll explore Amazon Web Services (AWS) as a platform. We will take the perspective of a new startup company spinning up infrastructure in AWS for the very first time. We’ll use a scenario-based approach, where you’ll don the persona of a security engineer on your first day at a new startup. This course will demonstrate ideas like secure-by-default and will examine services and patterns for locking down defaults using a combination of open source and platform-native tooling. Finally, attendees will walk away with a practical understanding of various controls, detections, and guardrails.

Antisyphon – Securing The Cloud: Foundations

ادامه مطلب

Reversing Hero course is a very good course for people who want to learn reverse engineering from beginner to intermediate level. This course consists of 12 hours of video, the degree of difficulty of which increases step by step, and also in the Reversing Hero course, you have to try to solve the given exercises by yourself, and if you are completely stuck, you can watch the video of the solution to the exercise.

Reversing Hero

ادامه مطلب

The RedTeam Blueprint course from RedTeam Nation is a very special course for people who want to start Red Team, APT or penetration testing. This course also teaches the basic topics related to hacking and security in the operating system as well as the network, and is completely suitable for people who do not have any background. Partners of this institute are SANS, Offensive Security and Microsoft.

Syllabus

  • The 3 Teams
  • Penetration Testing Process
  • The Windows Operating System
  • The Linux Operating System
  • Operating System Internals
  • Active Directory
  • Kerberos
  • Data Manipulation
  • Networking
  • VPN’s
  • Firewalls
  • Building a Firewall
  • Programs
  • Python
  • Assembly
  • Scope Identification
  • Reconnaissance
  • Exploitation
  • Post Exploitation
  • Password Cracking
  • Covering Your Tracks
  • Reporting
  • Attacking a Windows Domain
  • Job Hunting

Redteam Blueprint by Redteam Nation

ادامه مطلب

Maltego Essentials is the official video tutorial series that guides you through the basics of Maltego to help you kickstart your investigations. Watch these 10 bite-sized tutorials and quickly learn about the most important Maltego features now!

Syllabuss

1. Introducing The Official Maltego Video Tutorial Series

2. Editions of Maltego

3. How to Install and Activate Maltego

4. Running Your First Transform

5. How to Navigate your Graph

6. Different Layouts and Views of a Maltego Graph

7. What You Should Know About Entities in an Investigation

8. Notes, Bookmarks & Attachments

9. What Are Collection Nodes

10. How to Import Data into Maltego

Maltego Essentials Course

ادامه مطلب

To demonstrate our commitment to closing the cybersecurity workforce gap, EC-Council has pledged $3.5 million toward its C|CT scholarships. These scholarships will help prepare multi-domain cyber technicians and train approximately 10,000 professionals to contribute to the industry. This initiative will offer successful awardees a unique, entry-level technical course, which will be partially funded by EC-Council and will cover complete fees for instruction, e-courseware, practical hands-on labs, critical thinking challenges, and live Cyber Range activities. Successful awardees will receive a scholarship to cover the cost of the education and certification resources. To take advantage of these benefits, awardees will be required to pay $199 for the proctoring and technology fee for the certification exam.

Syllabus

Information Security Threats and Vulnerabilities

Information Security Attacks

Network Security Fundamentals

Identification, Authentication, and Authorization

Network Security Controls – Administrative Controls

Network Security Controls – Physical Controls

Network Security Controls – Technical Controls

Network Security Assessment Techniques and Tools

Application Security

Virtualization and Cloud Computing

Wireless Network Security

Mobile Device Security

IoT and OT Security

Cryptography

Data Security

Network Troubleshooting

Network Traffic Monitoring

Network Logs Monitoring and Analysis

Incident Response

Computer Forensics

Business Continuity and Disaster Recoverys

Risk Management

EC-Council: Certified Cybersecurity Technician

ادامه مطلب