برچسب: Security

This course will cover the basics of using GDB on Linux – x86, x86_64 and ARM based platforms.

ادامه مطلب

The Certified Cybersecurity Technician (CICT) is an entry-level cybersecurity program created by EC-Council, the creator of the Certified Ethical Hacker (CIEH) certification, to address the global demand for a qualified cybersecurity workforce. EC-Council developed the CICT to provide individuals starting their careers in IT and cybersecurity with a certification that validates their hands-on technical skills.

ادامه مطلب

The Purple Team Analyst (CPTA V1) course offered by CyberWarFare Labs is an advanced cyber attack and detection learning platform. The course is designed to provide an in-depth understanding of various Web, Network, Host, and Active Directory-based attacks by various defensive solutions.

ادامه مطلب

SEC301, often referred to as an introductory cybersecurity course, focuses on building foundational knowledge and skills essential for anyone beginning their journey in cybersecurity. It is ideal for individuals with limited or no prior experience in the field and serves as a stepping stone toward more advanced cybersecurity concepts.

ادامه مطلب

Sophisticated attackers frequently go undetected in a victim’s network for an extended period. Attackers can blend their traffic with legitimate traffic that only skilled network analysts know how to detect. This course shows learners how to identify malicious network activity. The course provides an overview of network protocols, network architecture, intrusion detection systems, network traffic capture and traffic analysis. Learners review the types of network monitoring and the tools commonly used to analyze captured network traffic. The course also explores the best techniques for investigating botnets and how to use honeypots in network monitoring. The course includes lectures and hands-on lab sessions to reinforce technical concepts.

Syllabus

  • Understand the network monitoring and incident response processes
  • Discuss the pros and cons of statistical, connection, full content and event monitoring and tools
  • Perform event-based monitoring using Snort
  • Minimize network traffic with the Snort rule structure and custom rule creation
  • Review Snort alerts using the Sguil front end

Mandiant Academy – Network Traffic Analysis

ادامه مطلب

The SentinelOne Singularity Administration course provides comprehensive training for cybersecurity professionals. Whether you’re a seasoned system administrator or a novice threat hunter, this course caters to various roles and experience levels. Here are the key highlights:

  1. Singularity Platform & Policy Administration: Learn how to manage and configure SentinelOne’s Singularity platform, including policy administration and customization.
  2. Incident Response: Dive into effective incident response strategies using SentinelOne. Understand how to handle security incidents and mitigate threats swiftly.
  3. Ranger for Network Discovery & Attack Surface Management: Explore Ranger, a powerful tool for network discovery and managing attack surfaces. Enhance your threat detection capabilities.
  4. Threat Hunting: Develop skills in proactive threat hunting. Discover advanced techniques to identify and neutralize threats before they escalate.

SentinelOne Singularity Administration

ادامه مطلب