Digital Crime Intelligence & Forensic Analysis Training

Digital Crime Intelligence

Course Description: This comprehensive course will go over various tools and methodologies that are used during digital crime intelligence gathering and analysis. The course will go into detail on OSINT research methods, social engineering HUMINT methods, intelligence correlation methods, and how to get into the mindset of an attacker. Part 1 of course will focus […]

VoIP Attacks and Defense Training


Course Description: This course will cover all aspects of VoIP security configurations in a comprehensive lab environment. The course will cover exploitation techniques, post exploitation methodologies, denial of service vectors, and blackhat monetization methods that are in use by malicious actors during the present. Participants of the course will execute all concepts in a lab […]

Web Applications Hacking Attack Methods


Course Description: Web Applications are one of the most targeted and vulnerable aspects of any modern enterprise. As network infrastructure design and implementations become hardened, the weakest link remains the application layer. This course will provide a full overview of the types of attacks that are possible against web applications, as well as instruction as […]

Enterprise Security Awareness Course


Course Description: This comprehensive all day course will go over information security principles and practices that are integral for the successful and secure operation of a business enterprise. The course will go into detail on social engineering attack methods, real hacking methods that are used by attackers to breach the perimeter of an enterprise, and […]

Enterprise Penetration Testing Methods Training


Course Description: This comprehensive course will go over the tools and methodologies that are used during penetration tests in enterprise network environments. The course will utilize a lab environment for hands on instruction of manual penetration testing methods, as well as training on the use of exploitation frameworks, such as Metasploit. This course will focus […]

Hacking U.S. Secrets, China Pushes for Drones


For almost two years, hackers based in Shanghai went after one foreign defense contractor after another, at least 20 in all. Their target, according to an American cybersecurity company that monitored the attacks, was the technology behind the United States’ clear lead in military drones. “I believe this is the largest campaign we’ve seen that […]