Windows Malware Forensics

Windows Malware Forensics

Windows Malware Forensics INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Digital forensics in rapid-changing space Post-mortem (forensics) vs....
Threat Hunting with SIEM

Threat Hunting with SIEM

Threat Hunting with SIEM INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Introduction and overview Terminology – APT, TTP, Kill chain, Pyramid of...
SOC Analyst

SOC Analyst

SOC Analyst INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Networking Fundamentals OSI and TCP/IP models The physical layer The Ethernet...
Network monitoring and detection

Network monitoring and detection

Network monitoring and detection INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Why bother parsing network traffic? Anatomy of targeted attacks...