Top Categories

Spotlight

Week News
Sorry, there is nothing for the moment.

White Hat Certified Defender

Background

Our aim is to give our students hands-on, real-life oriented practical knowledge that can instantly be used by those who play – or wish to play – a role in the security team in an enterprise environment.

Throughout the course we illustrate and analyse the individual steps of the defence procedure through the incident management of a lifelike APT attack – how the subsequent phases are structured, how they interact, and what roles this necessitates on the personnel side. We study in detail the following Blue Team and SOC (Security Operations Center) roles: L1 analyst; Threat intelligence analyst; L2 analyst; Forensics and Network forensics experts; Malware analyst; Threat Hunter; SOC system administrator, coordinator and manager; CISO.



CONTACT US FOR A FREE QUOTE


Phone Contacts

Email Contacts