The course (Certified Cybercrime & forensic Examiner - 3C&FE) has been designed to encounter digital evidence while conducting
Digital forensic investigation.
Student will be able to learn about:
- Chain of Custody
- Understanding Forensic Procedures
- Understanding ISO 27037
- Electronic Evidence Preservation
- Online/Offline Imaging
- Forensic Analysis
- Email Forensic Investigation
|
The course (Certified Offensive Red Teamer - CORT) has been
designed to gain insight knowledge about how Red Team tasks are performed.
Student will be able to learn about:
- Understanding Red Teaming Concept
- Abusing/ violating IT sensitive Infrastructure and security systems to detect
loopholes.
- Hunting/ Finding vulnerabilities in IT systems to counter possible future
threats -- Learning to mimic the offensive hacker mindset and approach to IT
abuse/ offense
|
The course (Certified System
Compromise Assessor - CSCA) has been designed to combat againt system
comrpomise, this course helps to counter an incident situation and correct the
right artifacts from the system.
Student will be able to learn about:
- Methodology of Compromise assessment
- Network Level Compromise assessment
- Application level compromise assessment
- Incident containment
- Analyzing Memory dumps and artifacts.
|
The course (Certified Open-Source Threat Intelligence Professional -
COSTIP) has been designed to understand how Open-Source threat
intelligence works.
Student will be able to learn about:
- CREST Framework
- Assessing & Analyzing Breached Data
- Conducting threat analysis
- Performing threat attribution
- Assessing threat actors methodology
- Discover Data on Dark Web
- Search for User Data (Email, Username )
|
The course (Certified Cybercrime & Threat Analyst- CC&TA) is an
intital level cybersecurity certification which has been designed to get
knowledge about cybersecurity fundamentals including (Threat, Vulnerability,
Risk, Impact, Criticality assessment).
Student will be able to learn about:
- Criticality & Impact Assessment
- Asset Classification & VA
- Understanding ISO 27001
- Review Nnetwork configurations.
|