Upcoming Open Registration Programmes
This class is tailored for malware analysts, system developers, forensic analysts, incident responders, or enthusiasts who want to analyse Windows kernel rootkits or develop software for similar tasks. It introduces the Windows architecture and how various kernel components work together at the lowest level. It discusses how rootkits leverage these kernel components to facilitate nefarious activities such as hiding processes, files, network connections, and other common objects. As part of the analytical process, we will delve into the kernel programming environment; we will implement some kernel-mode utilities to aid our understanding.
This course teaches IT professionals the most fundamental concepts on how to build secure Windows workstations and networks, perform rapid forensics investigations, and exploit the most common vulnerabilities affecting Windows systems.
This course will provide detailed workshop discussion and case studies on key information security areas. We will focus on practical development and implementation of processes to manage governance, risk and compliance,and business continuity areas relating to information security within the enterprise.
Red Teaming – The Fundamentals is a basic yet potent introductory course to Red Teaming. Our instructors teach the fundamental knowledge and skills that novice Red Teamers require to deliver cyber-attack simulations. No prior knowledge of computer hacking is assumed. Detailed step-by-step instructions are provided for students to learn how to attack Windows networks using some of the same ways that like real attackers use.
Red Teaming "The Advanced User-Land Techniques" imparts user-land exploitation techniques specifically designed to evade advanced enterprise security products, as well as make incident detection and response a real nightmare. Students will practice Red Teaming against a network with hundreds of machines, containing multiple VLANs, and which are properly defended by endpoint detection, response and defence-in-depth.
The course you are interested in has not been scheduled? Contact us to discuss running it especially for your company.