Cybersecurity
Showing 1153–1164 of 1317 results
Software-Defined Perimeter (SDP): Leveraging Zero Trust to Create a New Network and Security Architecture
In this course, you will gain the knowledge to implement the new approach to securing your network infrastructure and applications using the software-defined perimeter approach to zero trust (SDP). SDP makes protected assets invisible.
Specialized Attacks: Hardware Product Testing
This course will teach you to access firmware, analyze it and then reverse engineer it to identify weaknesses and vulnerabilities in the device.
Specialized Attacks: OT and ICS
This course will teach you how to perform reconnaissance, analyze network protocols, and conduct attacks against Operational Technology. This will show how weak cyber security in OT environments can significantly disrupt manufacturing operations.
Specialized Attacks: Physical and Social Engineering
In this course you will learn what social engineering is, why it matters, and who is performing it. Using case studies, you will be able to understand the techniques, tools, and vectors used in the real world.
Specialized Attacks: Wireless
This course will teach you to identify the vectors and techniques used by threat actors to gain access to networks and systems via wireless technologies.
Specialized DFIR: Windows File System and Browser Forensics
Analyzing Windows file systems and browser artifacts can provide critical information in investigations.
Specialized DFIR: Windows Registry Forensics
The Windows registry is a valuable source of information during a forensic investigation. This course will teach you how to investigate the registry to obtain evidence of malicious execution and persistence.
Specialized Exploits: Stack Overflows and Bypasses
This course will teach you the essential skills required to craft Linux and Windows stack-based buffer overflow attacks.
Specialized Exploits: Windows and Linux Shellcode
This course will teach you the essential skills required to craft Linux and Windows x86 shellcode, harnessing them using basic C/C# and PowerShell code.
Specialized Hunts: Threat Hunting within Active Directory
Active Directory is used in most medium and large companies, making it a significant target for abuse. This course will teach you how to hunt for threats in Active Directory to uncover malicious activity rapidly, allowing you to respond faster
Specialized Hunts: Threat Hunting within Mail Servers
This course will teach you how you can perform threat hunting analysis on email servers.
Specialized Hunts: Threat Hunting within Virtual Machines
VMs are part of the environment in which an adversary can operate. This course will teach you how to set up and perform a specialized threat hunt within VMs.