Windows Malware Forensics

Windows Malware Forensics

Windows Malware Forensics INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Digital forensics in rapid-changing space Post-mortem (forensics) vs....
Threat Hunting with SIEM

Threat Hunting with SIEM

Threat Hunting with SIEM INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Introduction and overview Terminology – APT, TTP, Kill chain, Pyramid of...
SOC Analyst

SOC Analyst

SOC Analyst INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Networking Fundamentals OSI and TCP/IP models The physical layer The Ethernet...
Network monitoring and detection

Network monitoring and detection

Network monitoring and detection INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Why bother parsing network traffic? Anatomy of targeted attacks...
Mobile Forensics

Mobile Forensics

Mobile Forensics INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour History of Mobile 3G and the rise of Smartphones Old operating systems Symbian,...