Security Operations Training

We offer private and remote Security Operations training for your organisation, facilitated by some of the world's leading SOC and CSIRT practitioners.

CSIRT / SOC Fundamentals

CSIRT / SOC Fundamentals

Set your new CSIRT on the path to success.

Learn the fundamentals of establishing a CSIRT, the functions of a CSIRT, and how to operate a CSIRT efficiently.

Open Source Security Orchestration - Automating the Boring Stuff

Open Source Security Orchestration - Automating the Boring Stuff

Automate grunt work with workflows, playbooks and integrations.

Learn how to use open source tooling to automate the contextualisation and remediation of security threats in your environment.

Open Source Intelligence for SOC Analysts

Open Source Intelligence for SOC Analysts

Tap into the power of OSINT.

In this workshop we'll look at what information can be used to perform OSINT and some common tools that can be used to investigate information further.

Threat Hunting for Windows Persistence Artefacts

Threat Hunting for Windows Persistence Artefacts

Detect the most common persistence mechanisms.

There are many ways for a threat actor to maintain persistence in Windows systems. We'll take a look at some common persistence mechanisms, where to look and what can be done to detect them.

No items found.