ANONYMOUS RETURN
![]()
FEATURES:
-
This is an intense, hands-on course designed to take students through a wide variety of topics relevant to operationally-focused cyber missions within the offensive and defensive arenas. Students will receive highly technical and mission relevant training needed to significantly minimize the burden of on-the-job training required to immediately impact operations.
-
This two-week course is focused on the methodologies and processes used by professional “Blue” teams in corporate and government spaces. Instructors use open-source tools to teach students methodologies of securing a network and its hosts. Students will learn the necessary skills to successfully identify: the customer’s network, tools required and allowed, mission scope & key terrain, then map the network, and its hosts. They will learn to protect: verifying base-lines, check configurations, evaluate A/V & IDS systems.
-
The Adversarial Threat Modeling and Emulation course is an intense, hands-on course that takes students through each stage of offensive operations methodologies using tradecraft, stealth and detection avoidance as the key principals.
-
Students will be taught the fundamentals of malicious code analysis beginning with the configuration of a malware analysis lab in order to gain an understanding of the components of a malware analysis toolbox and to discover each component that contributes to either behavioral or code analysis techniques.
SOURCES : CLICK HERE
DOWNLOAD
Passwords: Click here