Monitoring, Detection, Defense

This course teaches participants how to collect and analyze information using different tools and creating automation. Students will be further exposed to collecting information from the Darknet, social networks, and other sources.

Open-source intelligence (OSINT) covers the techniques and procedures practiced retrieving targeted information from open-source networks containing immense amounts of data. This course teaches participants how to collect and analyze information using every data source available. Students will be further exposed to collecting information from the Darknet, social networks, and other sources.

Threat hunting is the proactive technique that focuses on pursuing attacks and the evidence that attackers leave behind when they patrol an attack using malware or expose sensitive data.

Nowadays, a Security Operation Centers (SOC) should have everything it needs to mount a competent defense of the constantly changing IT enterprise. The SOC includes a vast array of sophisticated detection and prevention technologies, cyber intelligence reporting, and access to a rapidly expanding workforce of talented IT professionals. This SOC Operation course is designed for SOC organizations to implement a SOC solution and provide full guidance on the necessary skills and procedures to operate it. The training will provide participants with all aspects of a SOC team to keep the enterprise’s adversary.

Network security is a board term that covers multiple technologies, devices, and processes. Nowadays, every organization, regardless of size, industry, or infrastructure, requires a network security expert in place to protect it from the ever-growing landscape of cyber threats today.

Reverse Engineering is a technique used to analyze software to identify and understand its components and its flows. It is a process of understanding code infringement processes and analyzing software weaknesses. Reverse Engineers analyze systems to create system representations in another form of abstraction.

Malware Analysis is the study and close examination of malware to understand its origins, purpose, and potential impact on the system. Malware analysts accomplish their tasks by using various tools and expert-level knowledge to understand not only what a piece of malware can do but also how it does it.

Cryptography is an indispensable tool for protecting information in computer systems. In this course, you will learn the inner workings of cryptographic systems and how to use them in real-world applications correctly

OS Forensics is the ART of extracting evidence and important artifacts from a digital crime scene that can help the investigator in reconstructing the chain of events.

Penetration testers face with a combination of intrusion detection systems, host-based protection, hardened systems, and analysts that pour over data collected by their security information management systems.
Penetration tests help find flaws in the system to take appropriate security measures to protect the data and maintain functionality