- This is an intense, hands-on course designed to take students through a wide variety of topics relevant to operationally-focused cyber missions within the offensive and defensive arenas. Students will receive highly technical and mission relevant training needed to significantly minimize the burden of on-the-job training required to immediately impact operations.
- This two-week course is focused on the methodologies and processes used by professional “Blue” teams in corporate and government spaces. Instructors use open-source tools to teach students methodologies of securing a network and its hosts. Students will learn the necessary skills to successfully identify: the customer’s network, tools required and allowed, mission scope & key terrain, then map the network, and its hosts. They will learn to protect: verifying base-lines, check configurations, evaluate A/V & IDS systems.
- The Adversarial Threat Modeling and Emulation course is an intense, hands-on course that takes students through each stage of offensive operations methodologies using tradecraft, stealth and detection avoidance as the key principals.
- Students will be taught the fundamentals of malicious code analysis beginning with the configuration of a malware analysis lab in order to gain an understanding of the components of a malware analysis toolbox and to discover each component that contributes to either behavioral or code analysis techniques.
SOURCES : chironcommercial.com
CYBER CORE OPERATIONS =>
CYBER PROTECTION PROFESSIONAL =>
CYBER THREAT EMULATION PROFESSIONAL =>
DISCOVERY AND COUNTER-INFILTRATION PROFESSIONAL =>
To get more update join telegram : Telegram: Contact @secuhex
This content has been shared under Educational And Non-Profit Purposes Only.
For Copyright Content Removal Please Contact the Original Poster (OP)
Secuhex have no control over the shared content and nature of the external sites.