This course is a continuation of Python for Cybersecurity. The topics covered are execution, persistence, privilege escalation and evasion. … [Read more...] about Execution, persistence, privilege escalation and evasion
Security
Introduction to Cybersecurity Essentials
Build key skills needed to recognize common security threats and risks. Discover the characteristics of cyber-attacks and learn how organizations employ best practices to guard against them. Designed specifically for beginners and those who are interested in a Cyber Analyst I or an entry-level Cloud & Security Engineer role, this course dives into the world of cybersecurity to … [Read more...] about Introduction to Cybersecurity Essentials
In the Trenches: Security Operations Center
Cyber-attacks, breaches, and incidents continue to grow. The sophistication and complexity of these attacks continue to evolve. More than ever organizations need to plan, prepare, and defend against a potential cyber incident. Security Operation Centers (SOCs) act as an organization's front-line defense against cyber incidents. SOC analyst accomplishes this by monitoring and … [Read more...] about In the Trenches: Security Operations Center
Stages of Incident Response
The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects. This course starts with a high-level discussion of what happens at each phase of responding to an incident, followed by a technical deep dive into some of the … [Read more...] about Stages of Incident Response
Windows Registry Forensics
The Windows Registry Forensics course shows you how to examine the live registry, the location of the registry files on the forensic image, and how to extract files. … [Read more...] about Windows Registry Forensics