برچسب: Security

The SentinelOne University Singularity Foundations course is designed to empower cybersecurity professionals with essential knowledge and skills related to the SentinelOne Singularity platform. Whether you’re a system administrator, an IT operations specialist, or a security analyst, this course provides a solid foundation for understanding and effectively utilizing SentinelOne’s cutting-edge security technology.

ادامه مطلب

The SentinelOne University Incident Response course provides participants with the knowledge and skills necessary to effectively use the SentinelOne platform for identifying and responding to incidents. Whether you’re a seasoned incident responder or just starting out, this course equips you with actionable insights and practical techniques.

ادامه مطلب

SentinelOne University offers cybersecurity training programs, including a comprehensive Threat Hunting course. Whether you’re a system administrator seeking to enhance your skills or a seasoned threat hunter looking to expand your toolkit, this course has actionable and insightful content for every role and experience level.

Here are the key highlights of the SentinelOne University Threat Hunting course:

    • The course focuses on repeatable and documentable cyber threat hunting methodologies.
    • Participants will learn about various tools that enhance the effectiveness of threat hunting.

Whether you’re diving into threat hunting for the first time or refining your expertise, SentinelOne University provides the resources you need to stay ahead in the ever-evolving cybersecurity landscape. 🛡️🔍

SentinelOne – Threat Hunting

ادامه مطلب

This course covers key aspects of cybersecurity, including understanding threats, vulnerabilities, and the necessary countermeasures. It may also delve into specialized areas such as zero-day vulnerability research.

ZeroDayEngineering – Cybersecurity vs. Zero Day Engineering

ادامه مطلب

This 4-day course cuts through the mystery of Cloud Services (including AWS, Azure, and G-Cloud) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing traditional network infrastructure. Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and knowing how to protect yourself from them is critical. This course covers both the theory as well as a number of modern techniques that may be used to compromise various Cloud services and infrastructure. Prior pentest/security experience is not a strict requirement, however, some knowledge of Cloud Services and familiarity with common Unix command-line syntax will be beneficial.

ادامه مطلب

This is a hand-on practical concentrated course on securing and attacking web and cloud APIs. APIs are everywhere nowadays: In web apps, embedded systems, enterprise apps, cloud environments and even IoT, and it is becoming increasingly necessary to learn how to defend, secure and attack API implementation and infrastructure. This training aims to engage you in creating secure modern APIs, while showing you both new and old attack vectors.

Syllabus

Defending and attacking Web APIs (REST, GraphQL..etc)
Attacking and securing AWS APIs and infrastructure.
Launching and mitigating modern Injection attacks (SSTI, RCE, SQLi, NoSQLi, Deserialization & object injection)
Deploying practical cryptography.
Securing passwords and secrets in APIs.
API authentication and authorization.
Targeting and defending API architectures (Serverless, web services, web APIs)
Securing development environments.

Attacking and Securing APIS (2021)

ادامه مطلب