محتوى الدورة
Train Hard, Fight Easy: Fast, effective response to modern threats Red Canary Readiness Redefining incident response preparedness Backdoors & Breaches: Expansion deck chronicles | Red Canary Backdoors & Breaches: Breaking it down Establishing an effective response capability | Red Canary Defenders on Defenders | Red Canary 3 things to consider when buying EDR | Red Canary How we stopped a hospital ransomware attack Outsmarting the adversary: Mastering security strategies Is your security 'Kenough'? Mastering detection & prevention Browser-related malware on the rise | Red Canary Threat Intelligence The Detection Series: Crypters and loaders Emulating ransomware threats using Atomic Red Team What is lateral movement? The identity crisis: Why your network is more vulnerable than ever Understanding cloud-native threats How to investigate a suspicious alert How supply chain attacks spread ransomware Uptick in Storm-1811 activity detected | Red Canary Threat Intelligence Identity attacks explained: How adversaries steal credentials & takeover accounts Web-based cyber attacks explained: Understanding RCE & SQL injection vulnerabilities Resolutions for resilience: Strengthening defenses to combat insider threats Resolutions for resilience: Trust less & verify more in 2025 Resolutions for resilience: Is your incident response plan ready? Tangerine Turkey makes its debut | Red Canary Threat Intelligence Resolutions for resilience: Embracing automation for efficiency What SOC practitioners need to know about AI Mocha Manakin explained: Custom NodeJS RAT and pre-ransomware tactics Why adversaries LOVE scripts Insights from the 2025 Incident Response & Readiness Guide Why AI is worth it: Transforming detection engineering in the SOC

للحصول على شهادة

  • 1- التسجيل
  • 2- مشاهدة الكورس كاملا
  • 3- متابعة نسبة اكتمال الكورس تدريجيا
  • 4- بعد الانتهاء تظهر الشهادة في الملف الشخصي الخاص بك