Click on any of the sections below to select the right training course for you
Do you Devops? Or even if you're into standard programming approaches. Our wide variety of trainings focused on application security will appeal to you.
Applying patches, hardening systems, addressing Windows, Unix, and Databases - these courses are highly customizable to your specific environment
Be it imaging hard drives and analyzing them using Encase or FTK, or analyzing gigabytes of logs or getting a deeper insight into the killchain.
Jumpstart your career into next gear with an industry-valued certification such as the CISSP, CISM, CISA, CEH or CHFI
As an LEA official, no matter what the nature of the crime you are investigating, a cybercrime angle tends to come in almost always. Be it call log analysis, data imaging and analysis or plain old email header tracing. These courses will help fill in the missing gaps in your arsenal.
CISOs operate in an increasingly high-risk and demanding role and need to be constantly updated on the latest cybersecurity technologies, appropriate organizational structures and regulatory requirements.
End-users form the first line of defense and our security awareness capsules are designed to address key aspects and get your employees to come onboard your cybersecurity program.
Understanding the myriad regulatory and compliance requirements for cybsecurity is an ongoing challenge. These courses cover standards such as ISO 27001, PCI DSS, HIPAA and others.
The blog post covers different active techniques of subdomain enumeration. These techniques provide information regarding all the domains/subdomains of the target organization. The information contains all those subdomains that currently may or may not be in use by the organization.
Read MoreIn passive sub-domain enumeration, an adversary or tester gathers the sub-domain information without directly connecting to the infrastructure managed by the organization. In this process, the adversary or tester gathers the information from third parties like, the information is gathered by Virustotal, DNSDumster, certificate, etc. Generally, any alerts of flags are not raised during such probing.
Read MoreThe new law comes into force on 1 July 2020. However, the DIFC Commissioner of Data Protection (the Commissioner) is not expected to actively enforce the law until 1 October 2020. This gives organizations a window of four months in which to review their data protection and processing activities and implement the latest compliance measures.
Read MoreKanwal K. Mookhey (CISA, CISSP, CISM) is the Principal Consultant and Founder at Network Intelligence and IIS
Saraladevi is the Operations Head of IIS and began the journey in 2008!