• Security , Shop

    DIGITAL FORENSICS AND INCIDENT RESPONSE: TACTICAL EDITION

    Digital forensics and incident response are two of the most critical fields in all of information security. The staggering number of reported breaches in the last several years has shown that the ability to rapidly respond to attacks is a vital capability for all organizations. Unfortunately, the standard IT staff member is simply unable to effectively respond to security incidents. …

  • Security , Shop

    Attack Emulation Tools: Atomic Red Team, CALDERA and More w/ Carrie Roberts

    This class will provide an overview of the MITRE ATT&CK framework and give you in-depth, hands-on knowledge of how to execute scripted attacks that exercise many of the techniques defined in MITRE ATT&CK. You will be provided with hands-on lab instructions for emulating a variety of attacks and creating visualizations using the MITRE ATT&CK Navigator. At the end of this …

  • Security , Shop

    Cisco Certified Support Technician (CCST) Cybersecurity

    This entry-level Cisco Certified Support Technician (CCST) Cybersecurity training prepares entry-level cybersecurity professionals to operate, maintain, troubleshoot, and configure the Cisco devices and software that keep devices and networks secure.

     

    HOMEPAGE – https://www.cbtnuggets.com/it-training/cisco/ccst-cybersecurity

     

    Original Price: $59
    Our Price: $6
  • Shop , Security

    EC-Council Certified Incident Handler (ECIH v3)

    This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe.

    It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post breach consequences by reducing the impact of the incident, from both a financial and a …

  • Security , Shop

    Offensive Tool Development

    The Offensive Tool Development is the first course which is dedicated to Windows API exploitation to build your own tools for Red Team Engagements.

    This course is highly technical in nature, involving a lot of coding and all the tools will be written in either C or C++, sometimes PowerShell (maybe 5%) to make sure the user has capabilitiy to load …

  • Security , Shop

    Threat Reconnaissance Using Remote Scoutware

    Incident response to live cyberattacks requires silent navigation through compromised assets, sometimes in large distributed networks. The popular approach relies on EDR or other live agent-based solutions. However, the activation of security agents and obvious activities on live compromised systems may trigger alerts of advanced threat actors. Once alerted, a cleanup operation and destruction of evidence can happen. Moreover, offline …

  • Security , Shop

    Windows Enterprise Incident Response

    This intensive three-day course is designed to teach the fundamental investigative techniques needed to respond to today’s cyber threats. The fast-paced course is built upon a series of hands-on labs that highlight the phases of a targeted attack, sources of evidence and principles of analysis. Examples of skills taught include how to conduct rapid triage on a system to determine …

  • Security , Shop

    Creative Red Teaming (PDF-Tools)

    Mandiant red teams have conducted hundreds of covert red team operations. This course draws on that knowledge to help learners improve their ability to prevent, detect, and respond to threats in an enterprise network.

    Learners will better understand advanced threat actor behavior that Mandiant experts have observed through incident response investigations. Learners will also see how Mandiant red teams refine advanced …

  • Programming , Security

    Bro Scripting

    Hands-On Bro Scripting is a foundational course that will help you unlock the flexibility of Bro to make sure you have the right data at the right time.

    You’ll also develop useful foundational scripts you can use to guide your detection and analysis. This includes scripts for detecting large HTTP flows, extracting files based on MIME type, determining the ratios of HTTP …