Enterprise Defenses

Enterprise Defenses

Enterprise Defenses INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Course Introduction First thing first The Enterprise Network Inventory...
Endpoint and EDR

Endpoint and EDR

Endpoint and EDR INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour EDR Essentials EDR Introduction Understanding Endpoint protection Browsing...
CISSP Bootcamp

CISSP Bootcamp

CISSP Bootcamp INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Communication and Network Security Implement secure design principles in network...
Blue Team Defender

Blue Team Defender

Blue Team Defender INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Anatomy of a Cyberattack The attack lifecycle and the cyber kill chain model...
Using ELK

Using ELK

Using ELK INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Introduction to search engines History of search engines Types of search engines Intro...