catalog of
online courses

Start in cyber security / Fundamental

ANT0000

Fundamentals of cyber security

The material of this course will allow listeners to learn the basics of cybersecurity: directions and segments of this technological industry, classes and types of its products, technologies and methods of their use. The course material is based on the principle that cybersecurity is primarily a process, so much attention is paid to how to build enterprise-level cybersecurity processes within its unified architecture.

I'm interested →
Start in cyber security / Fundamental

ANT0001

Practical cryptography

The material of this course will allow listeners to study the theory and practice of using cryptography in today's cyber security realities.

I'm interested →

ANT0011

Traffic filtering

The material of this course will allow listeners to study technologies, specific mechanisms, and their application to prevent, detect, and respond to cyber security threats by filtering network traffic.

I'm interested →

ANT0012

Network infrastructure security

The material of the course will allow listeners to study technologies, specific mechanisms and their application for network infrastructure cyber security from the perspective of the Zero-Trust concept used in building corporate cybersecurity architecture.

I'm interested →

ANT0013

Protection from DoS and DDoS attacks

The material of the course will allow listeners to study technologies, specific mechanisms and methods of their application to protect corporate cyber security from DoS and DDoS attacks.

I'm interested →

ANT0021

Windows OS Security

The material of this course will allow listeners to study the principles, mechanisms and algorithms of data, service and application security on Windows OS. The course material also reveals methodological aspects of designing, implementing, and ensuring the operability of services and applications on Windows OS within the frame of corporate cyber security architecture.

I'm interested →

ANT0022

Linux OS Security

The material of this course will allow listeners to study the principles, mechanisms and algorithms of data, service and application security on Linux OS. The course material also reveals methodological aspects of designing, implementing, and ensuring the operability of services and applications on Linux OS within the frame of corporate cyber security architecture.

I'm interested →

ANT0023

Virtualization platforms security

The material of this course will allow listeners to study the principles, mechanisms and algorithms for securing virtualization and containerization platforms. The course material also reveals methodological aspects of designing, implementing and ensuring the operability of virtualization platforms within the frame of corporate cyber security architecture.

I'm interested →

ANT0031

DNS security

The course material will allow listeners to study the operation of protocols and mechanisms for ensuring cybersecurity of the DNS infrastructure. The course material also reveals the methodological aspects of designing, implementing, and ensuring DNS operability within the frame of corporate cyber security architecture.

I'm interested →

ANT0032

E-mail security

The material of this course will allow listeners to study operation of corporate e-mail cyber security protocols and mechanisms. The course material also reveals methodological aspects of designing, implementing, and ensuring the operability of e-mail within the frame of corporate cyber security architecture.

I'm interested →

ANT0033

IP-telephony security

The material of this course will allow listeners to study the protocols and mechanisms for ensuring cyber security of corporate IP-telephony. The course material also reveals methodological aspects of designing, implementing and ensuring the operability of IP-telephony solutions within the frame of corporate cyber security architecture.

I'm interested →

ANT0041

Monitoring cyber security events and incidents

The material of this course will allow listeners to study the processes, techniques and tools for monitoring cyber security events and incidents. The course material also covers how to organize cyber security event and incident monitoring processes and how to integrate them into the overall corporate cyber security architecture.

I'm interested →

ANT0051

Cyber security policies and control

The material of this course will allow listeners to study the principles, methods and tools for creating and managing cyber security policies in a corporate cyber security architecture. The course also covers the approach to implementing and maintaining cyber security controls.

I'm interested →

ANT0052

Modeling cyber security threats

The material of this course will allow listeners to study the methods of modeling cyber security threats based on the STRIDE methodology. In addition, the course addresses the issues of building a corporate cyber security architecture based on cyber security threat modeling.

I'm interested →

ANT0061

Personal data and privacy issues

The material of this course will allow listeners to study the issues of working with personal data, as well as the problem of privacy of cyberspace users. In addition, the course addresses the issues of building a corporate cyber security architecture that takes into account privacy concerns and compliance with regulatory requirements for handling personal data.

I'm interested →

ANT0071

Cyberecurity monitoring on industrial facilities

The course material will allow students to study the processes, techniques and tools for monitoring cybersecurity events and incidents at industrial facilities. The course material also covers issues of organizing processes for monitoring cybersecurity events and incidents and integrating them into the overall architecture of corporate cybersecurity.

I'm interested →
TCP/IP networks security / Professional

ANT0101

VPN

The material of this course will allow listeners to study how different technologies, mechanisms and methods of building Virtual Private Network (VPN) work, as well as to learn to embed VPN networks in architecture of corporate cyber security.

I'm interested →
TCP/IP networks security / Professional

ANT0102

Wi-Fi networks security

The material of this course will allow listeners to study operation of various technologies, mechanisms and methods of building secure Wi-Fi networks.

I'm interested →
TCP/IP networks security / Professional

ANT0103

802.1x access control

The material of this course will allow listeners to study the operation of access control mechanisms compliant with the IEEE 802.1x standard, and learn to design and deploy the appropriate infrastructure to implement these access control mechanisms.

I'm interested →
OS cyber security / Professional

ANT0201

OS access control in commercial organizations

The material of this course will allow listeners to study the principles, models and mechanisms of access control in operating systems used in commercial organizations to build an architecture of corporate cyber security, taking into account the specifics of the work of such organizations.

I'm interested →
OS cyber security / Professional

ANT0202

Account management

The material of this course will allow listeners to study the principles of account management in corporate cyber security architecture, as well as specific methods and mechanisms of access control: authentication, authorization and account accounting. The course specifically addresses distributed access control systems, so-called SSO systems: SAML, OAuth, OpenID Connect.

I'm interested →

ANT0301

WEB-application security

The material of this course will allow listeners to study the principles and specific mechanisms of Web-applications protection. The course material also reveals methodological aspects of designing, implementing and ensuring the operability of Web-applications within the frame of corporate cyber security architecture.

I'm interested →

ANT0302

Database security

The material of this course will allow listeners to study the mechanisms of ensuring database cyber security. The course material also reveals methodological aspects of designing, implementing, and ensuring the operability of databases within the frame of corporate cyber security architecture.

I'm interested →

ANT0401

Handling cyber security incidents

The material of this course will allow listeners to study the processes, techniques, and tools for handling cyber security incidents. The course material also covers how to organize cyber security incident handling processes and how to integrate them into the overall corporate cyber security architecture.

I'm interested →

ANT0402

Digital forensics in OS and applications

The material of this course will allow listeners to study the processes, techniques, and tools for conducting forensic investigations of digital data from operating systems and applications. The course material also covers how to organize digital forensics processes and how they fit into the overall corporate cyber security architecture.

I'm interested →

ANT0403

Digital forensics in TCP/IP networks

The material of this course will allow listeners to study the processes, techniques, and tools for conducting forensic investigations of digital network activity data from corporate systems and applications. The course material also covers how to organize digital forensics processes and how to integrate them into the overall corporate cyber security architecture.

I'm interested →

ANT0404

Pentest of Network Infrastructure

The material of this course will allow listeners to study the principles, mechanisms, and tools for conducting pentest – penetration testing of the network infrastructure and its connected services and applications. This course considers pentest as one of the processes necessary for building corporate cyber security architecture, so it also raises methodological issues of pentest organization, as well as the use of data obtained as a result of pentest.

I'm interested →

ANT0405

Pentest of WEB-applications

The material of this course will allow listeners to study the principles, mechanisms, and tools for conducting pentest – penetration testing in Web-applications. This course considers pentest as one of the processes necessary for building corporate cyber security architecture, so it also raises methodological issues of pentest organization, as well as the use of data obtained as a result of pentest.

I'm interested →

ANT0501

Cyber security metrics

The material of this course will allow listeners to study the processes, techniques, and tools for monitoring corporate cyber security using metrics. The metrics covered include: a set of cumulative metrics, statistical metrics of cyber security threats. The course material also covers how to embed metrics-based monitoring processes into a corporate cyber security architecture.

I'm interested →

ANT0502

Cyber security risk management

The material of this course will allow listeners to study methods of risk management, more specifically - risk assessment, based on the construction of numerical probabilistic models, in particular Monte Carlo models. A number of risk assessment methods proposed at the seminar are probabilistic Bayesian methods applied under conditions of partial uncertainty. For all the methods considered, adjustment techniques are given, taking into account subjective data. In addition, the course deals with methods of risk assessment under conditions of "full uncertainty". The main goal of the seminar is to show the possibility of using measurable and mathematically reliable numerical methods of risk management in the context of cyber security.

I'm interested →

ANT0601

Data leakage protection

The material of this course will allow listeners to learn methods and mechanisms of protection from data leakage in corporate cyber security architecture, including Data Loss Prevention systems. The course addresses data leakage issues in the context of corporate fraud and insider threats.

I'm interested →

ANT0602

Data security

The material of this course will allow the listeners to study the principles, approaches and technologies of data preservation: archiving, backup, and disaster recovery. The course will also cover the issues of designing these processes.

I'm interested →

ANT0701

Cyber security of industrial facilities

The material of this course will allow listeners to study the architecture, principles, methods and mechanisms of cyber security of industrial infrastructure. The course also covers international standards and regulations for industrial infrastructure cyber security and provides clarification on local regulatory requirements.

I'm interested →

ANT1001

Sandbox&Honeypot

The material of this course will allow listeners to study the technologies and mechanisms of operation of Sandboxes and Honeypots. The material of the course covers not only theoretical but also methodological aspects of Sandboxes and Honeypots usage: their integration into the overall architecture and processes of corporate cyber security.

I'm interested →

ANT1002

PKI

The material of this course will allow listeners to study the technologies and mechanisms of operation of Public Key Infrastructure. The material of the course covers not only theoretical but also practical aspects of PKI deployment: design within the frame of corporate cyber security architecture, management of cryptographic keys and digital certificates, monitoring and ensuring the security of PKI infrastructure.

I'm interested →

ANT3004

DevSecOps

The material of this course will allow listeners to study the principles of organization and building DevSecOps processes for ensuring cyber security in the development of corporate applications and services.

I'm interested →

ANT4001

Digital Forensics of RAM

The material of this course will allow listeners to study the processes, techniques, and tools for conducting forensic investigations of digital data in RAM. The course material also covers how to organize digital forensics processes and how to integrate them into the overall corporate cyber security architecture.

I'm interested →

ANT4002

Digital Forensics of Databases

The material of this course will allow listeners to study the processes, techniques, and tools for conducting database forensic investigations. The course material also covers how to organize digital forensics processes and how to integrate them into the overall corporate cyber security architecture.

I'm interested →

ANT4003

Methods of bypassing cyber security tools

The material of this course will allow listeners to study the principles, mechanisms and tools for bypassing cyber security tools and systems during penetration testing – pentest – of the network infrastructure and its connected services and applications.

I'm interested →

ANT4004

Threat Intelligence

The material of this course will allow listeners to learn the principles and mechanisms of obtaining, processing and using information about cyber threats, cyber-attacks and their consequences - so-called Threat Intelligence information. Also, the course material reveals in detail the topic of Threat Intelligence not just from the position of obtaining the necessary information, but from the position of processes and their use to ensure corporate cyber security. In addition, the course material describes the design and integration of Threat Intelligence into corporate cyber security architecture.

I'm interested →

ANT5001

Enterprise cyber security architecture

This course studies the principles, methods, and tools for building an enterprise cybersecurity architecture that includes an information security management system and a set of operational and technical cybersecurity processes. The course material allows students learn how to form these components into a consistent and measurable architecture that will allow them to define and solve strategic and tactical enterprise cyber security challenges.

I'm interested →

ANT5002

Building Security Operation Center (SoC)

This course covers the principles, methods, and tools for building an Operational Security Center (SoC). The SoC is to be built in the context of the goals and objectives of the SoC within the framework of the corporate cyber security architecture.

I'm interested →

ANT5003

Physical security design

The material of this course will allow students to study the issues of design and the nuances of implementing facility physical security systems, including the regulatory requirements of Russian regulators.

I'm interested →

ANT7001

Pentest of Industrial Facilities

The material of this course will allow listeners to study the principles, mechanisms and tools of pentest testing of industrial infrastructure. In this course, pentest is considered as one of the processes necessary for building cyber security of an industrial facility, so it also raises methodological issues of pentest organization, as well as the use of data obtained as a result of its conduct.

I'm interested →

ANT-ICS101

Industrial facilities operations

The material of this course will allow students to study the basics of the functioning of Industrial Control System (ICS) at industrial infrastructure facilities. The course examines the key elements, mechanisms and protocols of ICS operation, as well as issues of building the architecture of an industrial automation system.

I'm interested →

ANT-N101

TCP/IP networks

The material of this course will allow listeners to study the operation of modern data networks based on the TCP/IP protocol stack.

I'm interested →

ANT-OL101

Linux OS architecture and operation

The material of this course will allow listeners to study the principles, mechanisms and algorithms of Linux OS operation. The course material also reveals the nuances of Linux services and applications.

I'm interested →

ANT-OW101

Windows OS architecture and operation

The material of this course will allow listeners to study the principles, mechanisms and algorithms of Windows OS operation. The course material also reveals the nuances of Windows OS services and applications.

I'm interested →