Stay frosty within AWS, Azure, & GCP environments with this fast-paced and hands-on course which teaches each participant the Tactics, Techniques, and Procedures (TTPs) needed to infiltrate and expand access within cloud platforms. In this course you will: Exploit serverless (e.g. Lambda, Azure Functions) applications for initial access into targets. Pivot between data and control planes to expand access (e.g. secrets, snapshots) Evade and disrupt cloud logging platforms (e.g. CloudTrail) to remain undetected. Breach and backdoor boundaries (e.g. VPCs) to access hard to reach systems. Expanding access within Kubernetes (K8s) envs (e.g. GCP bypass of metadata protections) Compete throughout the course in our hands-on Capture the Flag (CTF) tournament!

Astute AWS/Azure/GCP Cloud Red Team: It’s Raining Shells! – 2021

ادامه مطلب

Malware analysis and memory forensics are powerful analysis and investigative techniques used in reverse engineering, digital forensics, and incident response. With adversaries getting sophisticated and carrying out advanced malware attacks on critical infrastructures, Data Centers, private and public organizations, it is essential for cyber-security professionals to have the necessary skills to detect, respond and investigate such intrusions. Malware analysis and memory Forensics have become a must-have skill for fighting advanced malwares, targeted attacks, and security breaches. This hands-on training teaches the concepts, tools, and techniques to analyze, investigate, and hunt malwares by combining two powerful techniques malware analysis and memory forensics. After taking this course, attendees will be better equipped with the skills to analyze, investigate, and respond to malware-related incidents.

ادامه مطلب
Invicti is a web application security platform that helps organizations find and fix vulnerabilities in their websites and APIs. Invicti combines dynamic, interactive, and software composition analysis (DAST, IAST, and SCA) to provide comprehensive and accurate testing results. Invicti also integrates with the tools and workflows of developers, enabling them to produce more secure code and prevent vulnerabilities from reaching production. Invicti is trusted by more than 3,100 customers worldwide, including Fortune 500 companies, government agencies, and leading e-commerce platforms.

Invicti – Web Application Security For Enterprise

 

ادامه مطلب

Acunetix is a web application security scanner that helps you find and fix vulnerabilities in your web applications, web services, and APIs. It can scan any website or web application that uses HTTP or HTTPS protocol and supports various frameworks, languages, and technologies. Acunetix can detect over 7,000 types of vulnerabilities, including OWASP Top 10, SQL injection, XSS, misconfigurations, exposed databases, and more. It also provides vulnerability assessment and management features, such as severity ratings, remediation guidance, false positive reduction, and integration with development tools. Acunetix is available as an on-premise or cloud solution and can be used by businesses of all sizes to automate web application security testing and ensure long-term protection.

Acunetix

ادامه مطلب

Tenable Nessus is a powerful vulnerability scanner that helps you identify and fix security issues in your network, web applications, cloud infrastructure, and more. With Nessus, you can:

  • Scan your IT assets for thousands of known and emerging vulnerabilities, with low false positives and high accuracy.
  • Audit your systems for compliance with industry standards and best practices, such as PCI DSS, CIS Benchmarks, NIST, and more.
  • Discover and assess your internet-exposed attack surface, including web applications, domains, certificates, and cloud assets.
  • Leverage advanced features such as web application scanning, external attack surface scanning, cloud infrastructure scanning, and custom policies.
ادامه مطلب

This course covers the law of fraud, crime, policy, contracts, liability, IT security and active
defense—all with a focus on electronically stored and transmitted records. It also teaches
investigators how to prepare credible, defensible reports, whether for cyber crimes, forensics,
incident response, human resource issues or other investigations.
Each successive day of this five-day course builds upon lessons from the earlier days in order to
comprehensively strengthen your ability to help your enterprise (public or private sector) cope
with illegal hackers, botnets, malware, phishing, unruly vendors, data leakage, industrial spies,
rogue or uncooperative employees, or bad publicity connected with IT security.
Recent updates to the course address hot topics such as legal tips on confiscating and
interrogating mobile devices, the retention of business records connected with cloud computing
and social networks like Facebook and Twitter, and analysis and response to the risks and
opportunities surrounding open-source intelligence gathering

Syllabus

SECTION 1: Fundamentals of Data Security Law and Policy

SECTION 2: E-Records, E-Discovery and Business Law

SECTION 3: Contracting for Data Security and Other Technology

SECTION 4: The Law of Data Compliance: How to Conduct Investigations

SECTION 5: Applying Law to Emerging Dangers: Cyber Defense

LEG523: Law of Data Security and Investigations

ادامه مطلب