Egg-ceptional Cybersecurity Sale: Crack-open the Egg-citing Savings!
The second week of four-week promotion ends in:
Days
Hours
Minutes
Seconds
Ready to take your cybersecurity skills to the next level?
How do you celebrate the spring season? We do it by painting and finding eggs with surprises and gifts!
This season, you can join us and unlock the secrets of cybersecurity with this Egg-citing promo! Dive into our "Egg-ceptional Cybersecurity Sale" and boost your skills.
From 21.03 to 21.04, every week we will open three eggs with egg-stra promo!
3rd stage, from 6th to 13th April is ACTIVE
Below is the selection of courses for our thirdstage offer!
Masterclass: Hacking and Securing Windows Infrastructure
Experts: Paula Januszkiewicz, Mike Jankowski-Lorek, PhD
Overview:
In this workshop, you will investigate the critical tasks for a high-quality penetration test. We will look at the most efficient ways to map a network and discover target systems and services. Once it has been done, we will search for vulnerabilities and reduce false positives with manual vulnerability verification. At the end we will look at exploitation techniques, including the use of authored and commercial tools. In the attack summary we will always go through the securing techniques.
Exploits are not the only way to get to systems! We will go through the operating systems' build in problems and explore how they can be beneficial for hackers! One of the most important things to conduct a successful attack is to understand how the targets work. To the bones! Afterwards everything is clear and the tool is just a matter of our need. The course covers all aspects of Windows infrastructure security from the hacker's mind perspective! Our goal is to show and teach you what kind of mechanisms are allowing to get inside the infrastructure and how to get into operating systems. After the course you will gain penetration tester's knowledge and tools.
To get more practice we offer three extra weeks of labs online!
Implementation workshop: Covering all aspects of Windows infrastructure security that everyone talks about, this workshop will teach you how to implement securing technologies one by one. During this course you will learn how to design and implement secure infrastructures based on the reasonable balance between security and comfort with a deep understanding of a cyber attacker's capabilities. The course is limited to 12 participants, so reserve your spot today!
This course is ideal for: Enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.
To attend this training, you should have a good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.
Unique exercises: All exercises are based on Windows Server 2016 and 2019, Windows 10 and Kali Linux. This course is based on practical knowledge from tons of successful projects, many years of real-world experience and no mercy for misconfigurations or insecure solutions! Remember that the labs will stay online for an extra three weeks so you may practice even more after the training is completed!
Platform and Technical Requirements: To participate in the course you need a Stable internet connection. For best learning experience we also need you to have a webcam, headphones and a microphone. Open RDP port 3391 for the connection to the Lab environment is needed as well. We will setup a secure Zoom classroom for every day of the course – we will send you a safe link to join the conference by e-mail.
Certification: After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!
Masterclass: Windows Security and Infrastructure Management with Windows Internals
Experts: Paula Januszkiewicz, Mike Jankowski-Lorek, PhD
The secure infrastructure configuration should be the most important line of defense in every organization. Unfortunately, people, the most valuable resource, are not always aware of the level of security in their companies, possible points of entry, how operating systems are attacked, and how to protect the infrastructure from successful attacks which are sometimes caused by configuration mistakes. Understanding internal OS protection mechanisms and services/roles completely provides a huge impact on the whole infrastructure security level. Unfortunately, the problem is… rarely anyone has this impact!
Advanced access rights, password mechanisms, windows internals, PowerShell usage for security purposes, gaining unauthorized access, advanced DNS configuration and common configuration mistakes, Active Directory security, IIS Security, debugging, advanced monitoring and troubleshooting and much more!
Topics covered during this training will help you to walk in hackers' shoes and evaluate your infrastructure from their point of view.
Intense exercises:
This course is packed with unique labs exercises! All exercises are based on Windows Server 2016 and 2019, Windows 10 and Kali Linux. To get more practice we offer three extra weeks of labs online!After the training concludes, you may practice even more and repeat to consolidate newly gained skills and knowledge.
This course is ideal for:
Enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.
Platform and Technical Requirements:
To participate in the course you need a Stable internet connection. For the best learning experience we also need you to have a webcam, headphones and a microphone. Open RDP port 3391 for the connection to the Lab environment is needed as well. We will setup a secure Zoom classroom for every day of the course – we will send you a safe link to join the conference by e-mail.
Certification: After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!
Incident Response, Collecting and Analyzing Digital Evidence
$
647
$
799
Expert: Paula Januszkiewicz
Overview: During this course, students will learn the general idea on good practices regarding evidence gathering. They will be able to perform memory dumps, analyze them, and recognize indicators of compromise. Students will also learn how to dump and analyze forensic data from disks, and how to properly extract as well as interpret evidence.
Evidence Gathering
Memory: Dumping and Analysis
Memory: Indicators of compromise
Disk: dumping & analysis
Disk: extracting and interpreting evidence
COURSE FORMULA
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.