برچسب: Security

The Getting Started in Security with BHIS and MITER ATT&CK course from Wild West Hackin Fest is designed for those who want to enter the world of cyber security. This course does not require prerequisites and its purpose is to understand and learn how to defend against attacks that happen on a daily basis by hackers. In this course, you will learn about 11 of the most important attacks that every organization must protect itself against. The instructor of this course is John Strand.

Getting Started in Security With BHIS and MITRE Att&CK

ادامه مطلب

This course is designed to teach the skills required to find and exploit vulnerabilities in real world iOS applications. The training includes exploits and vulnerabilities discovered on several penetration tests or in bug bounty programs. The target mobile apps used in this training are a state of art training apps.

Syllabus

Introduction to the Course

Training Presentation

Revisiting iOS Application Security – v.2023

Enciphers: iOS Application Security

ادامه مطلب

This risk management course is specifically designed to guide a CISO in defining and implementing a risk management approach within an IS program. The course introduces the student to the most common approaches and practices used by organizations worldwide. It is not intended to cover risk outside of the IS enterprise (including financial and business risks).

ادامه مطلب

EC-Council’s Certified Incident Handler program equips students with the knowledge, skills, and abilities to effectively prepare for, deal with, and eradicate threats and threat actors in an incident. This ANAB-Accredited and US DoD 8140 approved program provides the entire process of Incident Handling and Response and hands-on labs that teach the tactical procedures and techniques required to effectively Plan, Record, Triage, Notify and Contain. Students will learn the handling of various types of incidents, risk assessment methodologies, as well as laws and policies related to incident handling. After attending the course, students will be able to create IH&R policies and deal with different types of security incidents such as malware, email security, network security, web application security, cloud security, and insider threat-related incidents.

ادامه مطلب

is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.

ادامه مطلب

EC-Council’s Certified Penetration Testing Professional program teaches you how to perform an effective penetration testing in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, C|PENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.

ادامه مطلب