برچسب: Security

The SOC Analyst Job Role Path is for newcomers to information security who aspire to become professional SOC analysts. This path covers core security monitoring and security analysis concepts and provides a deep understanding of the specialized tools, attack tactics, and methodology used by adversaries. Armed with the necessary theoretical background and multiple practical exercises, students will go through all security analysis stages, from traffic analysis and SIEM monitoring to DFIR activities and reporting. Upon completing this job role path, you will have obtained the practical skills and mindset necessary to monitor enterprise-level infrastructure and detect intrusions at an intermediate level. The SOC Analyst Prerequisites skill path can be considered prerequisite knowledge to be successful while working through this job role path.

ادامه مطلب

The Certified Application Security Engineer (CASE) Java course from EC-Council is tailored for software developers and security professionals focused on secure Java application development. It provides essential skills in identifying security requirements, implementing secure coding practices, and managing application vulnerabilities throughout the software development lifecycle. The training includes real-world scenarios, practical labs, and hands-on exercises that cover topics like secure Java coding, security design, and risk management. By completing the CASE Java certification, participants gain valuable expertise in protecting applications from security threats.

ادامه مطلب

Windows Server has constantly been evolving as a product. You can still fulfill your needs for on premises technology while also have the possibility to invest in hybrid infrastructure. This path teaches you all you need to know about Windows Server 2022 administration for both Hybrid and On-premises situations.

ادامه مطلب
EC-Council’s Certified Threat Intelligence Analyst (CTIA) certification is a comprehensive specialist-level professional program focused on the ever-evolving domain of threat intelligence. The program is designed for individuals involved in collecting, analyzing, and disseminating threat intelligence information. CTIA covers a wide range of topics, including the fundamentals of threat intelligence, the use of threat intelligence tools and techniques, and the development of a threat intelligence program. The cyber threat intelligence course focuses on refining data and information into actionable intelligence that can be used to prevent, detect, and monitor cyber-attacks. The program addresses all the stages involved in the threat intelligence lifecycle, and this attention toward a realistic and futuristic approach makes CTIA one of the most comprehensive threat intelligence certifications in the market today.

ادامه مطلب

This course helps create and understand low-level Linux attack paths, improve your Linux detection coverage, see in action many Open Source DFIR/defensive projects, and understand the need for Linux telemetry, especially including Kubernetes clusters where Runtime Security solutions are a must these days. The techniques and attack paths covered in this training include many different implementations of eBPF, XDP, Ftrace, Kprobe, Uprobe, Netfilter, Systemtap, PAM, SSHD, HTTPD/Nginx, LD_PRELOAD-based code samples, and PoCs. Detection and forensics layers include LKRG, bpftool, Velociraptor IR, OSQuery, CLI-based /proc/ and /sys/ analysis, memory forensics with Volatility  2/3 Framework with the semi-automated RAM acquisition, Sysmon4Linux, Falco, Tracee, Sysdig, Tetragon, Sandfly Security, Zeek IDS, Suricata IDS, Moloch/Arkime FPC, Yara rules and more.

ادامه مطلب

Dark Web: Ultimate Guide (retired in 2019) is a comprehensive course that aimed to teach users how to navigate and make purchases on the dark web safely. It included lessons on Tails, Tor, Bitcoin, PGP encryption, and operational security.

ادامه مطلب