Free Online Training Available with UK TechDays Online 2016

Looking for an opportunity to learn about how Microsoft apps, products and services are used in the real world? TechDays Online 2016 is a free five day event that will do just that and you get to watch online from your own desk.

read more Continue reading Free Online Training Available with UK TechDays Online 2016

Resource: Microsoft Virtual Academy

The Microsoft Virtual Academy provides free courses for people working with Microsoft technologies as IT Pros, developers, Data Pros, students and many others. The training ranges from introductions to in-depth courses that cover that technologies im… Continue reading Resource: Microsoft Virtual Academy

Why Phishing Works

This morning, I checked my email and immediately spotted something suspicious in my inbox. I easily identified this email as a phishing attempt. It contained sparse wording, a link to a file, and the implication that it was sent to me from a safe place “securefileshares.com” (sounds trustworthy to me!) that I had never heard […]… Read More

The post Why Phishing Works appeared first on The State of Security.

Continue reading Why Phishing Works

Malware and Memory Forensics 2017 Schedule (Now with Linux, Mac, and Surge Collect Pro)

Our most popular training course just got even better! We’re happy to announce the curriculum for Malware and Memory Forensics by The Volatility Project now includes the following:

Linux and Mac OS X memory analysis
Windows memory acquisition with Vol… Continue reading Malware and Memory Forensics 2017 Schedule (Now with Linux, Mac, and Surge Collect Pro)

Malware and Memory Forensics 2017 Schedule (Now with Linux, Mac, and Surge Collect Pro)

Our most popular training course just got even better! We’re happy to announce the curriculum for Malware and Memory Forensics by The Volatility Project now includes the following:

Linux and Mac OS X memory analysis
Windows memory acquisition with Vol… Continue reading Malware and Memory Forensics 2017 Schedule (Now with Linux, Mac, and Surge Collect Pro)

4 Lessons Learned from Offensive v Defensive Training

In June this year, Fifth Domain ran a ten-day cyberwar course for 21 participants. The course provided participants with both red-team (offensive) and blue-team (defensive) cyber operations exercises. During the first eight days, participants learned a number of principles, frameworks and technical skills that were then put into practice during the final two-day cyberwar exercise. […]… Read More

The post 4 Lessons Learned from Offensive v Defensive Training appeared first on The State of Security.

Continue reading 4 Lessons Learned from Offensive v Defensive Training

Hacker Mindset: SANS NetWars & Tools of the Trade

In my ongoing blog series “Hacker Mindset,” I’ll explore an attacker’s assumptions, methods and theory, including how information security professionals can apply this knowledge to increase cyber-vigilance on the systems and networks they steward. In this article, I share my thoughts on NetWars – a live interactive Capture the Flag training exercise at SANS Rocky […]… Read More

The post Hacker Mindset: SANS NetWars & Tools of the Trade appeared first on The State of Security.

Continue reading Hacker Mindset: SANS NetWars & Tools of the Trade