ANT0000
The material of this course will allow listeners to learn the basics of cybersecurity: directions and segments of this technological industry, classes and types of its products, technologies and methods of their use. The course material is based on the principle that cybersecurity is primarily a process, so much attention is paid to how to build enterprise-level cybersecurity processes within its unified architecture.
I'm interested →ANT0001
The material of this course will allow listeners to study the theory and practice of using cryptography in today's cyber security realities.
I'm interested →ANT0011
The material of this course will allow listeners to study technologies, specific mechanisms, and their application to prevent, detect, and respond to cyber security threats by filtering network traffic.
I'm interested →ANT0012
The material of the course will allow listeners to study technologies, specific mechanisms and their application for network infrastructure cyber security from the perspective of the Zero-Trust concept used in building corporate cybersecurity architecture.
I'm interested →ANT0013
The material of the course will allow listeners to study technologies, specific mechanisms and methods of their application to protect corporate cyber security from DoS and DDoS attacks.
I'm interested →ANT0021
The material of this course will allow listeners to study the principles, mechanisms and algorithms of data, service and application security on Windows OS. The course material also reveals methodological aspects of designing, implementing, and ensuring the operability of services and applications on Windows OS within the frame of corporate cyber security architecture.
I'm interested →ANT0022
The material of this course will allow listeners to study the principles, mechanisms and algorithms of data, service and application security on Linux OS. The course material also reveals methodological aspects of designing, implementing, and ensuring the operability of services and applications on Linux OS within the frame of corporate cyber security architecture.
I'm interested →ANT0023
The material of this course will allow listeners to study the principles, mechanisms and algorithms for securing virtualization and containerization platforms. The course material also reveals methodological aspects of designing, implementing and ensuring the operability of virtualization platforms within the frame of corporate cyber security architecture.
I'm interested →ANT0031
The course material will allow listeners to study the operation of protocols and mechanisms for ensuring cybersecurity of the DNS infrastructure. The course material also reveals the methodological aspects of designing, implementing, and ensuring DNS operability within the frame of corporate cyber security architecture.
I'm interested →ANT0032
The material of this course will allow listeners to study operation of corporate e-mail cyber security protocols and mechanisms. The course material also reveals methodological aspects of designing, implementing, and ensuring the operability of e-mail within the frame of corporate cyber security architecture.
I'm interested →ANT0033
The material of this course will allow listeners to study the protocols and mechanisms for ensuring cyber security of corporate IP-telephony. The course material also reveals methodological aspects of designing, implementing and ensuring the operability of IP-telephony solutions within the frame of corporate cyber security architecture.
I'm interested →ANT0041
The material of this course will allow listeners to study the processes, techniques and tools for monitoring cyber security events and incidents. The course material also covers how to organize cyber security event and incident monitoring processes and how to integrate them into the overall corporate cyber security architecture.
I'm interested →ANT0051
The material of this course will allow listeners to study the principles, methods and tools for creating and managing cyber security policies in a corporate cyber security architecture. The course also covers the approach to implementing and maintaining cyber security controls.
I'm interested →ANT0052
The material of this course will allow listeners to study the methods of modeling cyber security threats based on the STRIDE methodology. In addition, the course addresses the issues of building a corporate cyber security architecture based on cyber security threat modeling.
I'm interested →ANT0061
The material of this course will allow listeners to study the issues of working with personal data, as well as the problem of privacy of cyberspace users. In addition, the course addresses the issues of building a corporate cyber security architecture that takes into account privacy concerns and compliance with regulatory requirements for handling personal data.
I'm interested →ANT0071
The course material will allow students to study the processes, techniques and tools for monitoring cybersecurity events and incidents at industrial facilities. The course material also covers issues of organizing processes for monitoring cybersecurity events and incidents and integrating them into the overall architecture of corporate cybersecurity.
I'm interested →ANT0101
The material of this course will allow listeners to study how different technologies, mechanisms and methods of building Virtual Private Network (VPN) work, as well as to learn to embed VPN networks in architecture of corporate cyber security.
I'm interested →ANT0102
The material of this course will allow listeners to study operation of various technologies, mechanisms and methods of building secure Wi-Fi networks.
I'm interested →ANT0103
The material of this course will allow listeners to study the operation of access control mechanisms compliant with the IEEE 802.1x standard, and learn to design and deploy the appropriate infrastructure to implement these access control mechanisms.
I'm interested →ANT0201
The material of this course will allow listeners to study the principles, models and mechanisms of access control in operating systems used in commercial organizations to build an architecture of corporate cyber security, taking into account the specifics of the work of such organizations.
I'm interested →ANT0202
The material of this course will allow listeners to study the principles of account management in corporate cyber security architecture, as well as specific methods and mechanisms of access control: authentication, authorization and account accounting. The course specifically addresses distributed access control systems, so-called SSO systems: SAML, OAuth, OpenID Connect.
I'm interested →ANT0301
The material of this course will allow listeners to study the principles and specific mechanisms of Web-applications protection. The course material also reveals methodological aspects of designing, implementing and ensuring the operability of Web-applications within the frame of corporate cyber security architecture.
I'm interested →ANT0302
The material of this course will allow listeners to study the mechanisms of ensuring database cyber security. The course material also reveals methodological aspects of designing, implementing, and ensuring the operability of databases within the frame of corporate cyber security architecture.
I'm interested →ANT0401
The material of this course will allow listeners to study the processes, techniques, and tools for handling cyber security incidents. The course material also covers how to organize cyber security incident handling processes and how to integrate them into the overall corporate cyber security architecture.
I'm interested →ANT0402
The material of this course will allow listeners to study the processes, techniques, and tools for conducting forensic investigations of digital data from operating systems and applications. The course material also covers how to organize digital forensics processes and how they fit into the overall corporate cyber security architecture.
I'm interested →ANT0403
The material of this course will allow listeners to study the processes, techniques, and tools for conducting forensic investigations of digital network activity data from corporate systems and applications. The course material also covers how to organize digital forensics processes and how to integrate them into the overall corporate cyber security architecture.
I'm interested →ANT0404
The material of this course will allow listeners to study the principles, mechanisms, and tools for conducting pentest – penetration testing of the network infrastructure and its connected services and applications. This course considers pentest as one of the processes necessary for building corporate cyber security architecture, so it also raises methodological issues of pentest organization, as well as the use of data obtained as a result of pentest.
I'm interested →ANT0405
The material of this course will allow listeners to study the principles, mechanisms, and tools for conducting pentest – penetration testing in Web-applications. This course considers pentest as one of the processes necessary for building corporate cyber security architecture, so it also raises methodological issues of pentest organization, as well as the use of data obtained as a result of pentest.
I'm interested →ANT0501
The material of this course will allow listeners to study the processes, techniques, and tools for monitoring corporate cyber security using metrics. The metrics covered include: a set of cumulative metrics, statistical metrics of cyber security threats. The course material also covers how to embed metrics-based monitoring processes into a corporate cyber security architecture.
I'm interested →ANT0502
The material of this course will allow listeners to study methods of risk management, more specifically - risk assessment, based on the construction of numerical probabilistic models, in particular Monte Carlo models. A number of risk assessment methods proposed at the seminar are probabilistic Bayesian methods applied under conditions of partial uncertainty. For all the methods considered, adjustment techniques are given, taking into account subjective data. In addition, the course deals with methods of risk assessment under conditions of "full uncertainty". The main goal of the seminar is to show the possibility of using measurable and mathematically reliable numerical methods of risk management in the context of cyber security.
I'm interested →ANT0601
The material of this course will allow listeners to learn methods and mechanisms of protection from data leakage in corporate cyber security architecture, including Data Loss Prevention systems. The course addresses data leakage issues in the context of corporate fraud and insider threats.
I'm interested →ANT0602
The material of this course will allow the listeners to study the principles, approaches and technologies of data preservation: archiving, backup, and disaster recovery. The course will also cover the issues of designing these processes.
I'm interested →ANT0701
The material of this course will allow listeners to study the architecture, principles, methods and mechanisms of cyber security of industrial infrastructure. The course also covers international standards and regulations for industrial infrastructure cyber security and provides clarification on local regulatory requirements.
I'm interested →ANT1001
The material of this course will allow listeners to study the technologies and mechanisms of operation of Sandboxes and Honeypots. The material of the course covers not only theoretical but also methodological aspects of Sandboxes and Honeypots usage: their integration into the overall architecture and processes of corporate cyber security.
I'm interested →ANT1002
The material of this course will allow listeners to study the technologies and mechanisms of operation of Public Key Infrastructure. The material of the course covers not only theoretical but also practical aspects of PKI deployment: design within the frame of corporate cyber security architecture, management of cryptographic keys and digital certificates, monitoring and ensuring the security of PKI infrastructure.
I'm interested →ANT3004
The material of this course will allow listeners to study the principles of organization and building DevSecOps processes for ensuring cyber security in the development of corporate applications and services.
I'm interested →ANT4001
The material of this course will allow listeners to study the processes, techniques, and tools for conducting forensic investigations of digital data in RAM. The course material also covers how to organize digital forensics processes and how to integrate them into the overall corporate cyber security architecture.
I'm interested →ANT4002
The material of this course will allow listeners to study the processes, techniques, and tools for conducting database forensic investigations. The course material also covers how to organize digital forensics processes and how to integrate them into the overall corporate cyber security architecture.
I'm interested →ANT4003
The material of this course will allow listeners to study the principles, mechanisms and tools for bypassing cyber security tools and systems during penetration testing – pentest – of the network infrastructure and its connected services and applications.
I'm interested →ANT4004
The material of this course will allow listeners to learn the principles and mechanisms of obtaining, processing and using information about cyber threats, cyber-attacks and their consequences - so-called Threat Intelligence information. Also, the course material reveals in detail the topic of Threat Intelligence not just from the position of obtaining the necessary information, but from the position of processes and their use to ensure corporate cyber security. In addition, the course material describes the design and integration of Threat Intelligence into corporate cyber security architecture.
I'm interested →ANT5001
This course studies the principles, methods, and tools for building an enterprise cybersecurity architecture that includes an information security management system and a set of operational and technical cybersecurity processes. The course material allows students learn how to form these components into a consistent and measurable architecture that will allow them to define and solve strategic and tactical enterprise cyber security challenges.
I'm interested →ANT5002
This course covers the principles, methods, and tools for building an Operational Security Center (SoC). The SoC is to be built in the context of the goals and objectives of the SoC within the framework of the corporate cyber security architecture.
I'm interested →ANT5003
The material of this course will allow students to study the issues of design and the nuances of implementing facility physical security systems, including the regulatory requirements of Russian regulators.
I'm interested →ANT7001
The material of this course will allow listeners to study the principles, mechanisms and tools of pentest testing of industrial infrastructure. In this course, pentest is considered as one of the processes necessary for building cyber security of an industrial facility, so it also raises methodological issues of pentest organization, as well as the use of data obtained as a result of its conduct.
I'm interested →ANT-ICS101
The material of this course will allow students to study the basics of the functioning of Industrial Control System (ICS) at industrial infrastructure facilities. The course examines the key elements, mechanisms and protocols of ICS operation, as well as issues of building the architecture of an industrial automation system.
I'm interested →ANT-N101
The material of this course will allow listeners to study the operation of modern data networks based on the TCP/IP protocol stack.
I'm interested →ANT-OL101
The material of this course will allow listeners to study the principles, mechanisms and algorithms of Linux OS operation. The course material also reveals the nuances of Linux services and applications.
I'm interested →ANT-OW101
The material of this course will allow listeners to study the principles, mechanisms and algorithms of Windows OS operation. The course material also reveals the nuances of Windows OS services and applications.
I'm interested →