SEC460 is a comprehensive course designed to equip information security professionals with the skills necessary to effectively secure large-scale enterprise environments, including cloud infrastructures. The course focuses on building technical vulnerability assessment capabilities and introduces a holistic methodology tailored to address the challenges faced by organizations managing extensive systems.
SEC583: Crafting Packets is a one-day, lab-intensive course designed to teach security analysts, network engineers, and system administrators the powerful skill of crafting and manipulating packets. This capability is essential for testing firewall policies, IDS/IPS rules, host/server settings, application configurations, and more.
SEC579 is a comprehensive course designed to equip security professionals with the knowledge and skills necessary to secure virtualized and software-defined infrastructures. As organizations increasingly adopt virtualization technologies and software-defined networking (SDN) to enhance efficiency and scalability, they also face new security challenges. This course addresses these challenges by providing in-depth coverage of securing virtual environments and SDN architectures.
SEC545 is a comprehensive course designed to equip security professionals with the knowledge and skills necessary to secure cloud infrastructures effectively. As organizations increasingly migrate to cloud environments, understanding how to design, implement, and manage security measures in these settings becomes crucial.
So you popped a shell, now what? Windows Post Exploitation focuses on four major components of any adversary simulation or red team exercise: enumeration, persistence, privilege escalation, and lateral movement. Each of these steps will be covered in detail with hands-on labs in a custom Active Directory environment. In addition, students will learn several modern techniques to minimize opportunities for detection. This course goes beyond teaching popular tactics, techniques, and procedures. Instead, students will learn how to covertly gather and leverage information about a target environment to achieve their objectives efficiently. A review of each post-ex capability will include discussion on the OPSEC implications and publicly documented detection recommendations. Open-source SIEM rules from Sigma and Elastic will be used as a starting point for avoiding alert generation. No technique is undetectable; the key is understanding an environment’s detection capabilities and choosing the best course of action.