Security breaches increase daily as hacker techniques consistently evolve. In order to reduce the damage and recover from the losses, we have to examine the treats and take action then. There are many penetration testing courses provided by those industry leaders in CyberLAB. Through these courses, you will learn about the latest and most common risk scenarios encountered by modern enterprises. You will be able to understand the latest offensive techniques and learn the most effective counterattacks.
Grab your seat now! Register yourself at CYBERSEC and on-site registration for CyberLAB.
Speaker
Speaker
Course Description
Historically, digital extortion has been carried out with malicious emails, compromised websites, or malvertisements, which infect victims' computers with ransomware. But as multiple recent cases have shown, cybercriminals are beginning to leverage targeted attack techniques in digital extortion. They compromise corporate systems from the outside and gain access to the systems and sensitive data. Then, they navigate across corporate networks with lateral movement techniques while encrypting files on critical servers along the way using legitimate tools to prevent the security teams from effectively investigate their attacks.
Faced with increasingly rampant cybercrime, how can security teams actively look for signs of attacks and discover how their systems are breached, while at the same time helping their companies build an investigative defense mechanism and promote security awareness?
This workshop will show you:
How IT security or network administration teams can investigate into such activities in order to deploy defenses and set up security alerts
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Course Description
This course takes leads you to understand the various hacking attacks in the form of hacking games, and experience the hacker economy.
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Course Description
Give attendees a general idea of unknown malware, and then inject and run a sample on the virtual machine. Teach them how to use various free tools with iForensics eDetector for to detect malware, analyze and retrieve the evidence. Then use Magnet AXIOM, the professional forensics software, with simulated sandbox for forensics investigation.
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Speaker
Course Description
Historically, digital extortion has been carried out with malicious emails, compromised websites, or malvertisements, which infect victims' computers with ransomware. But as multiple recent cases have shown, cybercriminals are beginning to leverage targeted attack techniques in digital extortion. They compromise corporate systems from the outside and gain access to the systems and sensitive data. Then, they navigate across corporate networks with lateral movement techniques while encrypting files on critical servers along the way using legitimate tools to prevent the security teams from effectively investigate their attacks.
Faced with increasingly rampant cybercrime, how can security teams actively look for signs of attacks and discover how their systems are breached, while at the same time helping their companies build an investigative defense mechanism and promote security awareness?
This workshop will show you:
How IT security or network administration teams can investigate into such activities in order to deploy defenses and set up security alerts
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Speaker
Course Description
The number of disclosures of vulnerabilities in industrial control systems has risen sharply in recent years. The industrial control environment and even the critical incidents of critical infrastructure intrusion in the country have been frequently occurred. However, compared with the IT environment, the industrial control environment mostly uses proprietary protocols, proprietary equipment (such as PLC, RTU). For the security researchers, the entry threshold is relatively high. Through this course, students can not only quickly acquire the basic knowledge of industrial control system information security, but also learn how to penetrate into the industrial control network, and analyze industrial control system protocol packets, industrial control system protocol attacks and so on.
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Course Description
Malware is getting more and more complicated and they are overwhelming everywhere, posing serious threats to your organization. It is true challenge to security officer to adapt new technology to tackling the treat.
In this session, we will analyze couple notorious malware tools damaging the community, and you will learn not only the behavior of the tool but also the ecosystem why the tool is prevailing. Not just lecturing, during the hands-on lab you will witness the tool in action and learn how Zyxel advanced multilayer technology mitigating the threat – spotting the threat at the first place and destroy it!
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Course Description
Recently, we face a lot of cyber attack all around, especially APT is persist to increase.
Due to the issue, we are using security products and services to reduce cyber security losses.
But these products and services will increase our loading in daily work.
In order to solve the problem, we provide a service which canl do a wide range of incident response in time.
The service we named IPaaS.
In this lesson, you will know how to hunting threat, tracing hacker’s behaviors, analysis malware, do incident response with cloud and get cyber security incident response of experience.
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Speaker
Course Description
Historically, digital extortion has been carried out with malicious emails, compromised websites, or malvertisements, which infect victims' computers with ransomware. But as multiple recent cases have shown, cybercriminals are beginning to leverage targeted attack techniques in digital extortion. They compromise corporate systems from the outside and gain access to the systems and sensitive data. Then, they navigate across corporate networks with lateral movement techniques while encrypting files on critical servers along the way using legitimate tools to prevent the security teams from effectively investigate their attacks.
Faced with increasingly rampant cybercrime, how can security teams actively look for signs of attacks and discover how their systems are breached, while at the same time helping their companies build an investigative defense mechanism and promote security awareness?
This workshop will show you:
How IT security or network administration teams can investigate into such activities in order to deploy defenses and set up security alerts
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Speaker
Course Description
Did you feel lost and doesn’t know where to start when dealing cyber-attacks? This course is designed for personnel who is new to Information Security and covers the fundamental techniques and tools to digital forensics, includes information analysis to locate malicious connections and malwares. Practices involve with memory blocks extraction of malicious process for potential C&C(Command & Control) server and furthermore, the attacker’s tactics and techniques.
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Speaker
Course Description
Historically, digital extortion has been carried out with malicious emails, compromised websites, or malvertisements, which infect victims' computers with ransomware. But as multiple recent cases have shown, cybercriminals are beginning to leverage targeted attack techniques in digital extortion. They compromise corporate systems from the outside and gain access to the systems and sensitive data. Then, they navigate across corporate networks with lateral movement techniques while encrypting files on critical servers along the way using legitimate tools to prevent the security teams from effectively investigate their attacks.
Faced with increasingly rampant cybercrime, how can security teams actively look for signs of attacks and discover how their systems are breached, while at the same time helping their companies build an investigative defense mechanism and promote security awareness?
This workshop will show you:
How IT security or network administration teams can investigate into such activities in order to deploy defenses and set up security alerts
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Speaker
Course Description
From time to time we need to provide evidence after attacks but wonder where to look. This course is designed for personnel involved in incident investigation, to locate attacker’s traces and entry points for corresponding records as well as attacker’s tactics and techniques.
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Speaker
Course Description
Historically, digital extortion has been carried out with malicious emails, compromised websites, or malvertisements, which infect victims' computers with ransomware. But as multiple recent cases have shown, cybercriminals are beginning to leverage targeted attack techniques in digital extortion. They compromise corporate systems from the outside and gain access to the systems and sensitive data. Then, they navigate across corporate networks with lateral movement techniques while encrypting files on critical servers along the way using legitimate tools to prevent the security teams from effectively investigate their attacks.
Faced with increasingly rampant cybercrime, how can security teams actively look for signs of attacks and discover how their systems are breached, while at the same time helping their companies build an investigative defense mechanism and promote security awareness?
This workshop will show you:
How IT security or network administration teams can investigate into such activities in order to deploy defenses and set up security alerts
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Course Description
The threat of business is rapidly evolving. The number of targeted threats such as malware, ransomware, data theft, and phishing is increasing, and the ability of malicious attackers to circumvent traditional security measures has intensified. Coupled with the adoption of SaaS, the cloud and the Internet of Things, the more sophisticated methods of threat delivery have triggered new challenges, control point complexity and security gaps that cannot be ignored.
With Akamai's global insights into the Internet and the Domain Name System (DNS), Enterprise Threat Protector enables security teams to proactively block and mitigate targeted threats and enforce the principles of proper use across the enterprise for security. The team is proactive in identifying, blocking, and defending against targeted threats such as malware, ransomware, phishing, data breaches, and more using the Domain Name System (DNS). Leverage real-time intelligence from Akamai Cloud Security Intelligence and Akamai's proven, recursive DNS platform around the world to deliver enterprise security, control and visibility efficiently, while easily integrating with your existing network defenses.
This hands-on course will give you an in-depth understanding of Akamai ETP's operating mechanism and hands-on experience to experience the speed, convenience, and high availability of Akamai ETP.
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Speaker
Course Description
Historically, digital extortion has been carried out with malicious emails, compromised websites, or malvertisements, which infect victims' computers with ransomware. But as multiple recent cases have shown, cybercriminals are beginning to leverage targeted attack techniques in digital extortion. They compromise corporate systems from the outside and gain access to the systems and sensitive data. Then, they navigate across corporate networks with lateral movement techniques while encrypting files on critical servers along the way using legitimate tools to prevent the security teams from effectively investigate their attacks.
Faced with increasingly rampant cybercrime, how can security teams actively look for signs of attacks and discover how their systems are breached, while at the same time helping their companies build an investigative defense mechanism and promote security awareness?
This workshop will show you:
How IT security or network administration teams can investigate into such activities in order to deploy defenses and set up security alerts
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Course Description
Introduce recent several important security incidents, and how to investigate / control incident by log management.
Introduce importance of log management in information security
Base on some real incident , to review whole picture of incident, and introduce ALog「detect internal fraud in advance」, and「how to trace when incident occurred」
By hands on and basic operation to easily understand how to use ALog, also introduce some software management /maintenance.
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Course Description
The main Purpose of this course is to deliver to our attendees of an introduction and demonstration in how to use AlienVault to analysis event correlations and find out the real threat. Users will be experiment from evaluating a risk to generating a real alarm and steps of incident report.
Course Benefits:
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
-