برچسب: Security

Big companies with complex IT infrastructure need to protect it – or face the consequences of being compromised. Sophisticated attackers can bypass automatic defenses unnoticed. Here’s where Security Operations Center (SOC) comes to the rescue, bringing the expertise and skills of its professionals for upgraded business protection. Developed by Kaspersky’s own SOC experts, this course offers a comprehensive training to SOC analysts and other staff dealing with security operations. The knowledge you will get is practical and tested: our experts update it daily, provide security to Kaspersky itself and deliver on-site training to clients all over the world. During the time on the course, you will get to know the diverse roles within a SOC, its services and use cases, get acquainted with the modern attack tactics, techniques, and procedures, and learn how SOC helps deal with them. Within the numerous extensive practice sessions in the restricted areas of the virtual labs, you’ll get an opportunity to develop your skills in incident detection and investigation.

Syllabus

General Cybersecurity concepts
Windows
Linux

Security operations and threat hunting

ادامه مطلب

Have you ever wondered how Kaspersky’s GReAT experts discovered some of the world’s most famous APT attacks? Now, the answer is within your reach. Our specialists have poured years of experience from the prominent cases they have worked on into our online Threat Hunting with Yara training. Course leader Costin Raiu, a 25 year veteran of the threat hunting industry, will teach you the unconventional ways of working with Yara so that you can find threats of the same magnitude as his team. Specifically designed for self-paced learning, our course is deeply practical and enables you to learn-by-doing, hunting for real threats in our dedicated Virtual Lab. Using world-renowned cases like BlueTraveller, Sofacy & WildNeutron as the basis of the course, Costin shares insights and techniques from his team’s exclusive research on these cases. This knowledge will enhance your career and improve your organisation’s threat defences.

Syllabus

Inception
String based rules
Efficient rules
Taking advantage of Yara modules
Hunting for new samples on VTI
Wildcards
Digital Certificate, imphashes and developer footprints
Malicious Office documents, OLE format
Expert Yara exercises
YarGen, automation and a bit of magic

Hunt APTs with Yara like a GReAT ninja

ادامه مطلب
Have you ever wondered about how web applications are attacked in the real world and what you can do to mitigate every attack? The Web Defense Professional Learning Path will illustrate exactly how each attack works, what the impact of each attack is, how to fix it, and how the exploit no longer works after the fix. This learning path will also give you in-depth, practical advice about how to simplify your defense and how to implement attack mitigations that actually work (regardless of you having access to the source code or not). In addition, it will cover mitigation advice for multiple platforms and languages, the OWASP Testing Guide, detailed techniques and methodology to simplify the defense of web applications, advanced usage of OWASP ZAP, OWASP OWTF, ModSecurity, and more. The Web Defense Professional Learning Path also prepares you for the eWDP exam and certification.
ادامه مطلب

Interested in establishing a proactive defense mentality and learning how to proactively hunt for threats in an organization’s network? Through expert-led instruction and risk-free lab environments, you can do all of that and more with the eLearnSecurity Certified Threat Hunting Professional (eCTHPv2) certification. This certification includes a practical exam in which you can conduct a threat hunt on a corporate network and propose defense strategies to be graded by INE’s expert cyber security instructors. With this certification, you can showcase your threat hunting talents to current and future employers.

eCTHPv2

ادامه مطلب

The Enterprise Defense Administrator certification covers topics ranging from: basic defensive engineering strategies, proper hardening of network devices and servers, vulnerability management, log gathering and analysis, and much more.

This certification exam is grounded in a hands-on approach, where candidates will be presented with a reproduction of a standard enterprise network and specific tasks to complete. In addition to the multiple-choice questions, the Enterprise Defense Administrator certification tests not only knowledge, but the ability to apply knowledge and skills in a practical lab-based environment.

ادامه مطلب