All current Information Security (InfoSec) Courses courses in 2024
213 Courses
GeoINT Mastery: A Pixel is Worth a Thousand Words
Discover how to extract intelligence from images using Geospatial Intelligence (GEOINT) techniques. Learn to identify objects, decode symbols, analyze text, and uncover hidden location clues using common browser tools.
Tapping the OSINT Potential of Telegram
Discover how to leverage Telegram's security gaps for OSINT investigations, focusing on the "similar channels" feature to reveal hidden networks, with practical tools for investigators, journalists, and researchers.
Maltego Community Workshop: OSINT and Custom Transforms - Recon Village
Master Maltego for OSINT investigations, from using built-in transforms to creating custom ones with maltego-trx. Learn to integrate external tools like Holehe and WhatsMyName to enhance your threat intelligence capabilities.
The Art of Pivoting in OSINT Investigations
Master the art of pivoting in OSINT investigations with techniques for expanding research, uncovering hidden connections, and automating workflows. Learn practical methods through real-world case studies while considering ethical implications.
Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign
Dive into the discovery of "Crimson Palace," a sophisticated Chinese cyber espionage campaign targeting a Southeast Asian government, featuring multiple threat clusters, novel malware variants, and adaptive evasion techniques.
Navigating Cybersecurity Risks in an AI-First World
Explore the critical cybersecurity challenges and risks emerging in our AI-driven society with expert insights on threat detection, mitigation strategies, and future security paradigms.
The Anticipatory Approach: Actionable Not Reactionable Cyber Threat Intelligence
Discover how to shift from reactive to proactive cyber threat intelligence through anticipatory approaches that help identify emerging security threats and design effective resilience strategies.
Identifying Detection Gaps and Enhancing CTI Value Through Case Study Analysis
Explore a real-world case study demonstrating how Cyber Threat Intelligence identifies detection gaps and transforms into actionable security strategies for enhanced organizational protection.
Building Cyber Threat Resilience with STRAT - A New Methodology for Cyber Threat Intelligence
Discover STRAT methodology for enhancing cyber defense resilience through systems thinking, enabling deeper threat analysis and improved defensive strategies while building adaptable security postures.
Advanced Threat Research Methodologies - Unraveling a Triple-APT Intrusion
Dive into advanced threat intelligence methodologies through a real-world case study of a triple nation-state APT attack, covering clustering techniques, attribution frameworks, and intelligence-driven hunting approaches.