ICS410: ICS/SCADA Security Essentials provides a foundational set of standardized skills and knowledge for industrial cybersecurity professionals. The course is designed to ensure that the workforce involved in supporting and defending industrial control systems is trained to keep the operational environment safe, secure, and resilient against current and emerging cyber threats.

Syllabus

ICS410.1: ICS Overview
ICS410.2: Architectures and Processes
ICS410.3: Communications and Protocols
ICS410.4: Supervisory Systems
ICS410.5: ICS Security Governance
ICS410.6: Capstone CTF
ادامه مطلب

This course focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we will look at writing shellcode, encoders, decoders, crypters and other advanced low level applications.

ادامه مطلب

This course focuses on the iOS platform and application security and is ideal for pentesters, researchers and the casual iOS enthusiast who would like to dive deep and understand how to analyze and systematically audit applications on this platform using a variety of bleeding edge tools and techniques.
A non-exhaustive list of topics to be taught includes:

  • Module 1: Introduction to iOS Security
  • Module 2: Creating an Application Pentest Platform
  • Module 3: Advanced Application Runtime Analysis
  • Module 4: Exploiting iOS Applications
  • Module 5: iOS Forensics and Data Recovery
  • Module 6: iOS Malware and Backdoors
  • Module 7: Further Study and Roadmap

Pentesting iOS Applications

ادامه مطلب

This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administrators who want to learn to automate tasks or go beyond just using ready made tools. We will be covering topics in system security, network security, attacking web applications and services, exploitation techniques, malware and binary analysis and task automation.
A non-exhaustive list of topics to be taught includes:

  • Python Scripting – Language Essentials
  • System Programming and Security
  • Network Security Programming – Sniffers and Packet Injectors
  • Attacking Web Applications
  • Exploitation Techniques
  • Malware Analysis and Reverse Engineering
  • Attack Task Automation
  • Further Study and Roadmap

Python For Pentesters

ادامه مطلب
The workshop is designed to introduce participants to the arcana of the best methods and tools for automatic detection of vulnerabilities and bug analysis in software in a practical way.
In the beginning, we will focus on understanding techniques: binary analysis, searching for various types of vulnerabilities and debugging. We “bite” into practical fuzzing and mistakes that keep programmers awake at night using their non-deterministic occurrence. Participants will learn techniques for analyzing application weaknesses, writing grammars, and obtaining test corpora guaranteeing exciting results.
After understanding the aspects of bughunting, the time will come to automate vulnerability analysis and debugging methods to ensure that defective code elements are quickly found.
The training focuses on x86 / x64 architecture, and attacking projects processing data in various formats (text, binary), network fuzzing on Windows and Linux platforms.

ادامه مطلب

Multi-Cloud Red Team Analyst (MCRTA) is designed for cybersecurity enthusiasts who want to embark on their Cloud Red Team journey. In this comprehensive program, you’ll dive deep into the fundamentals of AWSAzure, and GCP Cloud Security. The focus is on practical skills, ensuring that you gain hands-on experience in Multi-Cloud Red Teaming.

Syllabus

Introduction to Multi-Cloud Red Team

Red Teaming in AWS Cloud

Red Teaming in Azure Cloud

ادامه مطلب

خرید ووچر TryHackMe اختصاصی همراه با تحویل آنی و کمترین قیمت!