Showing 46–54 of 537 results

  • Security , Shop

    Advanced Infrastructure Hacking

    Our Advanced Infrastructure Hacking course is designed for those who wish to push their knowledge. Whether you are Pen Testing, Red Teaming or trying to get a better understanding of managing vulnerabilities in your environment, understanding advanced hacking techniques is critical.

    This course teaches the audience a wealth of advanced Pen Testing techniques, from the neat, to the new, to …

  • Security , Shop

    Practical Bug Bounty

    This comprehensive course dives into identifying and responsibly exploiting application vulnerabilities, laying a solid foundation in Web Application Architecture and delving into the crucial OWASP Top 10. Participants will distinguish Bug Bounty Hunting from Penetration Testing, engage in hands-on simulations, and master key tools like Burp Suite.

    The curriculum covers advanced evasion techniques and bypassing Web Application Firewalls (WAF), emphasizing ethical …

  • Security , Shop

    Windows incident response

    Are you looking to improve the expertise of your in-house digital forensics and incident response team? Or do you want to train yourself in the area of incident response to identify the complex attacks? This Kaspersky Windows Incident Response course brings you concentrated knowledge from the company’s Global Emergency Response Team (GERT) experts.

    The course’s curriculum is heavily focused on practicing. …

  • Security , Shop

    Suricata for Incident Response and Threat Hunting

    Suricata is the foundation for effective intrusion detection and prevention. With cyber attacks on the rise it’s more crucial than ever for businesses, enterprises or cybersecurity consultancies to have a comprehensive security strategy in place. And that’s where Suricata rules come to the rescue.

    The “Suricata for Incident Response and Threat Hunting” course from Kaspersky xTraining is the ultimate training program …

  • Security , Shop

    Targeted malware reverse engineering

    Skilled reverse engineers aren’t born – they’re made by experience. If you are a cybersecurity specialist with a good understanding of malware analysis methodologies & tools and are looking for more confidence in applying your skills, you can bridge the gap by working hands-on with real-life cases.

     

    HOMEPAGE – https://xtraining.kaspersky.com/courses/targeted-malware-reverse-engineering/

     

    Original Price: $1,400
    Our Price: $20
  • Security , Shop

    Advanced malware analysis techniques

    The main focus of the course is advanced static analysis because for cybersecurity incidents involving previously unseen malicious code, this is the most reliable way to determine functionality of the code and find actionable artefacts. It allows organizations affected by APTs to define adequate damage assessment and incident response.

     

    HOMEPAGE – https://xtraining.kaspersky.com/courses/advanced-malware-analysis-techniques/

     

    Original Price: $2,700
    Our Price: $25
  • Security , Shop

    Security operations and threat hunting

    Big companies with complex IT infrastructure need to protect it – or face the consequences of being compromised. Sophisticated attackers can bypass automatic defenses unnoticed. Here’s where Security Operations Center (SOC) comes to the rescue, bringing the expertise and skills of its professionals for upgraded business protection.

    Developed by Kaspersky’s own SOC experts, this course offers a comprehensive training to SOC …

  • Security , Shop

    YARA for Security Analysts

    Learn to use YARA to detect malware, triage compromised systems, and perform threat intelligence research.

    Detecting malicious elements within files is a core security skill for incident responders, SOC analysts, threat intelligence analysts, malware analysts, and detection engineers alike. There are different ways …

  • Security , Shop

    Attacking and Securing APIs

    This is a hand-on practical concentrated course on securing and attacking web and cloud APIs. APIs are everywhere nowadays: In web apps, embedded systems, enterprise apps, cloud environments and even IoT, and it is becoming increasingly necessary to learn how to defend, secure and attack API implementation and infrastructure.

     

    HOMEPAGE – https://www.blackhat.com/us-23/training/schedule/#attacking-and-securing-apis-virtual-30027

     

    Original Price: $4,300
    Our Price: $20