Security , Shop
Threat Reconnaissance Using Remote Scoutware
Incident response to live cyberattacks requires silent navigation through compromised assets, sometimes in large distributed networks. The popular approach relies on EDR or other live agent-based solutions. However, the activation of security agents and obvious activities on live compromised systems may trigger alerts of advanced threat actors. Once alerted, a cleanup operation and destruction of evidence can happen. Moreover, offline …
Security , Shop
Windows Enterprise Incident Response
This intensive three-day course is designed to teach the fundamental investigative techniques needed to respond to today’s cyber threats. The fast-paced course is built upon a series of hands-on labs that highlight the phases of a targeted attack, sources of evidence and principles of analysis. Examples of skills taught include how to conduct rapid triage on a system to determine …
Security , Shop
Creative Red Teaming (PDF-Tools)
Mandiant red teams have conducted hundreds of covert red team operations. This course draws on that knowledge to help learners improve their ability to prevent, detect, and respond to threats in an enterprise network.
Learners will better understand advanced threat actor behavior that Mandiant experts have observed through incident response investigations. Learners will also see how Mandiant red teams refine advanced …
Programming , Security
Bro Scripting
Hands-On Bro Scripting is a foundational course that will help you unlock the flexibility of Bro to make sure you have the right data at the right time.
You’ll also develop useful foundational scripts you can use to guide your detection and analysis. This includes scripts for detecting large HTTP flows, extracting files based on MIME type, determining the ratios of HTTP …
Security , Shop
Astute AWS/Azure/GCP Cloud Red Team: It’s Raining Shells!
Stay frosty within AWS, Azure, & GCP environments with this fast-paced and hands-on course which teaches each participant the Tactics, Techniques, and Procedures (TTPs) needed to infiltrate and expand access within cloud platforms.
In this course you will:
Exploit serverless (e.g. Lambda, Azure Functions) applications for initial access into targets.
Pivot between data and control planes to expand access (e.g. secrets, snapshots)
Evade and …Security , Shop
Malware Analyst Professional – Level 1
In this malware analysis and reverse engineering course, you will delve into the inner core of dissecting different malware types and variants, understand the adversarial mindset behind them and the used TTPs. At the end of the course, you will gain the power and knowledge to win any malware coming your way.
HOMEPAGE – https://training.trainsec.net/malware-analyst-professional-level-1
Original Price: $350
Our Price: $20
Security , Shop
Adversary Tactics: Vulnerability Research for Operators
In Adversary Tactics: Vulnerability Research for Operators, you will learn an operator-focused approach to find the vulnerabilities needed to escalate privileges, execute arbitrary code, or facilitate lateral movement in Windows environments. We will give you the methodology and identify tools to find these weaknesses during active operations, when costly lead time and dedicated lab environments are unavailable. This course covers …
Security , Shop
Windows Kernel Rootkits Training
To achieve maximum stealth and obtain unabated access to the system, rootkits execute in kernel mode. This course focuses on the kernel interfaces (APIs), data structures and mechanisms that are exploited by rootkits to achieve their goals at every stage of their execution.
This advanced course provides a comprehensive end-to-end view of the modus-operandi of rootkits by taking an in-depth look …
Security , Shop
Applied Web Application Hacking
Most organisations utilise web applications. Due to the exposed nature of web applications and complex business logic they contain, they are a valuable target for attackers. Throughout this course focus will be placed on the various vulnerabilities that could affect web applications.
This course will teach you how to analyse web applications for vulnerabilities and teach you how to exploit them …
Security
Showing 37–45 of 620 results