All current Information Security (InfoSec) Courses courses in 2024
213 Courses
Gen AI to Spark $338 Billion Cybersecurity Market
Discover how generative AI is driving cybersecurity market growth to $338 billion by 2033, with insights on enterprise spending trends for cloud security, monitoring, and data-loss prevention.
Hacking, Prompt Engineering, and the Future of Pentesting with AI
Explore the intersection of AI and cybersecurity in this keynote from NahamCon2025, covering prompt engineering techniques and how artificial intelligence is transforming penetration testing methodologies.
Building the MITRE ATT&CK Pipeline for Linux
Explore Linux attack patterns and adversarial behaviors beyond cryptocurrency mining, discovering how malware research shapes MITRE and Cisco's security frameworks.
Social Engineering with AI: Advanced Techniques
Master social engineering techniques, from phishing to deepfakes, and explore how AI enhances modern manipulation tactic
Introduction to Advanced Persistent Threats (APTs)
Discover the world of Advanced Persistent Threats (APTs), their classifications, naming conventions, and operational tactics used by nation-state actors, with insights into tracking and identification methods.
Developing an Adversary Emulation Plan for Red Teams and Cybersecurity
Learn how to create effective adversary emulation plans by selecting relevant threat actors, leveraging cyber threat intelligence, and mapping TTPs using the MITRE ATT&CK framework.
FIN6 Adversary Emulation Plan - TTPs and Tooling
Master advanced threat emulation techniques by exploring FIN6's sophisticated TTPs, from initial access to exfiltration, using the Center for Threat-Informed Defense Adversary Emulation Library.
Generative AI Cybersecurity & Privacy for Leaders: A Primer
Gain insights into generative AI's cybersecurity implications, from privacy risks to threat mitigation strategies, empowering leaders to implement secure and responsible AI adoption practices.
Emulating FIN6 Initial Access Through Office Word Macros
Dive into advanced spear-phishing techniques by learning to create malicious Word macro documents for initial access, following FIN6's tactics in a practical lab environment.
BLOB-Based Phishing Scams - Understanding Modern Email Attack Techniques
Discover how cybercriminals leverage BLOB-based techniques in modern phishing attacks and learn essential detection and prevention strategies for protecting against these emerging threats.