• Exclusive

    Hey Guest, unlock an instant 10% bonus discount when you upgrade via the Crypoverse gateway.

  1. protectaccount

    IT & Software Active Counter Measures – Threat Hunting – 2021

    Chris Brenton with Active Countermeasures is conducting a free, one-day, Cyber Threat Hunting Training online course. This will be a live online course with Q&A available. One of the biggest challenges in security today is identifying when our protection tools have failed and a threat actor has...
  2. protectaccount

    IT & Software Threat Hunting with Windows Event Forwarding | Cybrary

    In this course we will learn about an approach to collect events from windows devices in both normal operations and when an intrusion is suspected. We will use Windows Event Forwarding (WEF) natively built into Windows for Incident detection while sharing our learnings and step-by- step...
  3. protectaccount

    IT & Software Practical Threat Hunting – Applied Network Defense

    Practical Threat Hunting is a foundational course that will teach you how to approach threat hunting using a proven, structured, repeatable framework. I created this course to help people figure out what to hunt for, where to find it, and how to look for it. Practical Threat Hunting is for...
  4. protectaccount

    IT & Software Modern Threat Hunting Strategies to Identify Attacks

    Fortify your organization’s defenses against sophisticated cyber threats by learning how to implement methods and techniques that can prevent, identify, and mitigate attacks. Examine the critical areas of permissions, privileges, and network tracing to enhance the protection against...
  5. protectaccount

    Udemy Practical Cyber Threat Hunting

    In this course students will learn counducting threat hunting and compromise assessment. In the first module I created a real life attack scenerio as an adversary simulation in a demo lab. I lecture to my students about cyber threat intelligence sources and types, basic definition and terms like...
  6. protectaccount

    IT & Software Threat Hunting: Network Data

    Despite investing resources in cybersecurity, organizations can still fall prey to cyberattacks. While properly configured technology can prevent most attacks, cybercriminals have developed techniques to evade detection. In this course, Michael Wylie, an information security expert, provides his...
  7. sglcv2

    7 Advanced Hacker Ops You Won’t Learn in Courses

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Top Bottom