The course, “The Programmer Mindset: Problem Solving in C++”, is an in-depth training program designed to equip learners with the skills needed to solve complex problems using Cpp.

Syllabus

  1. Intro

  2. The Programmer Roadmap

  3. C++ Beginner Zone

  4. Arrays

  5. Strings

  6. Recursion

The Programmer Mindset: Problem Solving in CPP

ادامه مطلب

The course, “Cybersecurity ATTACK & DEFENSE: The Foundations”, is a comprehensive training program designed to provide the fundamental skills and roadmap needed for a successful career in cybersecurity. The course is divided into three main modules:

ATTACK: This module teaches how elite hackers infiltrate the world’s most secure networks, providing a foundation for careers in penetration testing and red team operations.
RESPOND: This module focuses on how cybersecurity experts protect their organizations against advanced attacks. It covers essential skills for working in incident response and threat hunting.
INVESTIGATE: This module instructs on how to perform a deep investigation of targeted attacks’ tools and malware, including static and dynamic analysis on a malicious file.
The course also includes a bonus module on Fileless Attacks & Targeted Ransomware Attacks1. The curriculum is hands-on and includes real-world scenarios, making it an excellent starting point for careers in incident response and malware analysis.

Syllabus

  1. Module 01 – ATTACK

  2. Module 02 – RESPOND

  3. Module 03 – INVESTIGATE

ادامه مطلب

Unlock the secrets of Windows forensic investigation with my new course! I took my years of experience creating videos on the 13Cubed YouTube channel and set out to develop affordable, comprehensive, and professional training. Whether you’re looking to get into the field, already work in the field but want to step up your game, or just have an interest in digital forensics, look no further. This course is for you!

Syllabus

Welcome and Introduction
Initial Setup
Windows Event Logs
The Registry
Evidence of Execution
Persistence, Privilege Escalation, and Lateral Movement
Anatomy of NTFS
File Deletion and Recovery
LNK Files and Jump Lists
Additional Content
Knowledge Assessment

Investigating Windows Endpoints

ادامه مطلب

If you’ve taken Investigating Windows Endpoints (or already have the equivalent knowledge), this is a natural continuation of the content that deep dives into Windows memory forensics. Learn the foundations of how Windows memory is structured, how to acquire memory, how to analyze memory images using Volatility, MemProcFS, and WinDbg, and more! This is for you.

Syllabus

Welcome and Introduction
Initial Setup
Foundations of Memory Forensics
Acquiring Memory
Poor Man’s Memory Forensics
Memory Analysis with Volatility
Malware Memory Analysis with Volatility
Memory Analysis with MemProcFS
Malware Memory Analysis with MemProcFS
Introduction to WinDbg
Additional Content
Knowledge Assessment

Investigating Windows Memory

ادامه مطلب

SEC550 will provide you with an understanding of the core principles of cyber deception, enabling you to plan and implement cyber deception campaigns to fit virtually any environment. You will be able to turn the tables on attackers so that while they need to be perfect to avoid detection, you need to be right only once to catch them.

Syllabus

SEC550.1: Understanding the Problem
SEC550.2: Deception Foundations
SEC550.3: Deception Techniques and Technologies, Part I
SEC550.4: Deception Techniques and Technologies, Part II
SEC550.5: Deception Concepts, Planning, and Evaluation
SEC550.6: Capstone Exercise
ادامه مطلب