برچسب: Security

The course “Attacking and Defending Azure & M365” is a comprehensive training program offered by Xintra. It provides an in-depth understanding of attack techniques, detection, forensics, and mitigation strategies on Azure and Microsoft 365. The course is designed to be hands-on and includes practical labs for real-world learning. It is suitable for individuals interested in cybersecurity, particularly in the context of Azure and Microsoft 365 environments. The course is self-paced, allowing learners to progress at their own speed, and also includes live sessions for interactive learning.

Syllabus

1. Introduction
2. Overview of Azure/M365
3. Setting Up Your Environment
4. Log Analysis Using SOF-ELK
5. Reconnaissance & Enumeration
6. Initial Access Techniques
7. Credential Theft
8. Lateral Movement Techniques
9. Privilege Escalation
10. Persistence Techniques
11. Defense Evasion

Attacking and Defending Azure & M365

ادامه مطلب

SEC566 provides a practical guide to implementing and auditing the Center for Internet Security (CIS) Critical Security Controls (CIS Controls). This course is designed to help organizations improve their cybersecurity posture by effectively prioritizing and deploying the CIS Controls framework. Participants will learn how to assess current security practices, identify gaps, and align them with CIS guidelines to reduce risk. The course also covers techniques for auditing the implementation of controls to ensure compliance and effectiveness. Through hands-on exercises and real-world scenarios, SEC566 equips security professionals with actionable strategies to strengthen defenses and achieve measurable improvements in cybersecurity.

ادامه مطلب

SEC556 focuses on the unique security challenges posed by the growing number of Internet of Things (IoT) devices. This course teaches participants how to identify, exploit, and secure vulnerabilities in IoT devices and their supporting infrastructures. Topics include network attacks, device manipulation, weak authentication, insecure communications, and firmware analysis. Through practical labs, students will perform hands-on penetration testing on a range of IoT devices, from consumer gadgets to industrial systems. SEC556 equips professionals with the skills needed to understand IoT-specific attack vectors, develop mitigation strategies, and improve the overall security of connected ecosystems in both personal and enterprise environments.

ادامه مطلب

SEC699 is an advanced course that focuses on the collaboration between red and blue teams, known as purple teaming, to enhance an organization’s defense mechanisms. Participants will learn how to emulate real-world adversary tactics, techniques, and procedures (TTPs) to identify weaknesses, while also strengthening detection and response strategies within the defense team. The course covers the use of advanced emulation tools, developing detection engineering techniques, and improving incident response processes. With hands-on labs and simulated attack scenarios, SEC699 equips security professionals to fine-tune their offensive and defensive capabilities, ensuring robust security and effective threat mitigation.

ادامه مطلب

SEC599 focuses on the integration of offensive and defensive strategies in purple team exercises to thwart advanced adversaries. This course explores how to use the kill chain model to identify and disrupt adversary tactics at every stage of an attack, from initial compromise to exfiltration. Participants will learn to emulate sophisticated threat actor techniques while developing and implementing effective defenses, detection systems, and countermeasures. Through hands-on exercises and attack simulations, students will gain expertise in strengthening their security posture by continuously improving their response to advanced persistent threats (APTs) and real-world attack scenarios.

ادامه مطلب

SEC565 focuses on the strategies, tactics, and techniques used by red teams to emulate advanced adversaries and conduct realistic penetration testing. This course provides in-depth training on planning, executing, and reporting red team operations, with an emphasis on simulating real-world cyberattacks across various attack vectors, such as phishing, social engineering, lateral movement, and privilege escalation. Participants will learn how to apply the MITRE ATT&CK framework for adversary emulation and how to tailor their operations to test an organization’s defenses. Through hands-on labs and real-world scenarios, SEC565 equips professionals with the skills to conduct thorough red team assessments, identify vulnerabilities, and improve an organization’s overall security resilience.

ادامه مطلب