SEC510 provides a deep dive into securing public cloud infrastructures, focusing on the top three platforms: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). The course covers key security challenges unique to the cloud, such as identity and access management (IAM), data protection, network security, and compliance across these environments. Participants will learn to assess and mitigate risks, implement best practices, and leverage native cloud security tools for threat detection and incident response. Through hands-on exercises and real-world case studies, SEC510 equips security professionals with the skills to protect and secure critical cloud-based resources in multi-cloud and hybrid cloud environments.

ادامه مطلب

SEC505 teaches security professionals how to secure Windows environments and automate security tasks using PowerShell while maintaining robust protection against internal and external threats. The course explores techniques for hardening Windows systems, securing PowerShell scripts, and detecting malicious automation. Participants will gain practical experience in securing automation workflows, managing administrative privileges, and mitigating common attack vectors like PowerShell-based exploits. With hands-on labs and real-world examples, SEC505 enables attendees to effectively secure Windows environments, automate incident response, and safeguard against advanced threats that target Windows systems and PowerShell automation.

ادامه مطلب

SEC501 is designed for experienced security professionals who protect enterprise environments from advanced threats. This course provides in-depth training on defending against sophisticated attacks using modern security tools and techniques. Participants will explore topics such as advanced intrusion detection, threat hunting, malware analysis, and effective use of security information and event management (SIEM) systems. The curriculum emphasizes real-world scenarios, including defending against ransomware, lateral movement, and insider threats. Through hands-on labs and exercises, SEC501 equips defenders with the expertise to strengthen an organization’s security posture, respond to incidents effectively, and build a resilient enterprise defense strategy.

ادامه مطلب

SEC488 provides foundational knowledge for securing cloud environments across various platforms, including AWS, Azure, and Google Cloud. This course is designed for security professionals seeking to understand cloud-specific risks, security controls, and compliance requirements. Participants will explore core topics such as identity and access management (IAM), secure configuration, data protection, and monitoring in cloud-native environments. With hands-on labs and practical exercises, students will gain the skills needed to identify vulnerabilities, implement security best practices, and safeguard cloud infrastructure. SEC488 is the ideal starting point for building a strong cloud security strategy and ensuring a secure adoption of cloud technologies.

ادامه مطلب

SEC575 provides a comprehensive approach to identifying, analyzing, and exploiting vulnerabilities in mobile applications on iOS and Android platforms. This course equips security professionals with the skills to perform advanced penetration testing and reverse engineering of mobile apps. Topics include secure coding practices, mobile app architecture, API security, and common vulnerabilities such as insecure data storage, improper authentication, and cryptographic flaws. Through hands-on labs and real-world scenarios, participants will learn to evaluate the security of mobile applications, uncover weaknesses, and provide actionable recommendations for remediation. SEC575 prepares attendees to tackle the unique challenges of securing mobile ecosystems effectively.

ادامه مطلب

“Security” is arguably one of the most challenging disciplines to move from being an individual contributor (IC) to being a manager. While security ICs can perform most tasks in isolation, a manager needs to regularly interact with people both inside and outside of the team. Further, “security” has its own language which can be completely foreign to people outside of the discipline. How do you take security concerns and convert them into a language that senior leaders and “C” levels can understand? Honing these skills will be the primary objective of this course. In this course, we will cover all of the steps needed to stand up and lead a security team within an organization. We start with a clean slate so that every aspect gets covered. If you are in an environment that already has a security team, this can help fill in the gaps. This course will have a heavy focus on how to integrate the security team with the rest of the business units. We’ll look at strategies for increasing funding, as well as converting “security risks” into “business risks” so they are better understood by the organization’s leadership. The course includes a lot of collateral like a full set of pre-written security policies. The goal is to help you build an effective security team in as little time as possible.

Antisyphon: Security Leadership and Management w/ Chris Brenton

ادامه مطلب