We offer private and remote Security Operations training for your organisation, facilitated by some of the world's leading SOC and CSIRT practitioners.
Learn the fundamentals of establishing a CSIRT, the functions of a CSIRT, and how to operate a CSIRT efficiently.
Learn how to use open source tooling to automate the contextualisation and remediation of security threats in your environment.
In this workshop we'll look at what information can be used to perform OSINT and some common tools that can be used to investigate information further.
There are many ways for a threat actor to maintain persistence in Windows systems. We'll take a look at some common persistence mechanisms, where to look and what can be done to detect them.