ANT0041
The material of this course will allow listeners to study the processes, techniques and tools for monitoring cyber security events and incidents. The course material also covers how to organize cyber security event and incident monitoring processes and how to integrate them into the overall corporate cyber security architecture.
I'm interested →ANT0401
The material of this course will allow listeners to study the processes, techniques, and tools for handling cyber security incidents. The course material also covers how to organize cyber security incident handling processes and how to integrate them into the overall corporate cyber security architecture.
I'm interested →ANT0402
The material of this course will allow listeners to study the processes, techniques, and tools for conducting forensic investigations of digital data from operating systems and applications. The course material also covers how to organize digital forensics processes and how they fit into the overall corporate cyber security architecture.
I'm interested →ANT0403
The material of this course will allow listeners to study the processes, techniques, and tools for conducting forensic investigations of digital network activity data from corporate systems and applications. The course material also covers how to organize digital forensics processes and how to integrate them into the overall corporate cyber security architecture.
I'm interested →ANT0404
The material of this course will allow listeners to study the principles, mechanisms, and tools for conducting pentest – penetration testing of the network infrastructure and its connected services and applications. This course considers pentest as one of the processes necessary for building corporate cyber security architecture, so it also raises methodological issues of pentest organization, as well as the use of data obtained as a result of pentest.
I'm interested →ANT0405
The material of this course will allow listeners to study the principles, mechanisms, and tools for conducting pentest – penetration testing in Web-applications. This course considers pentest as one of the processes necessary for building corporate cyber security architecture, so it also raises methodological issues of pentest organization, as well as the use of data obtained as a result of pentest.
I'm interested →ANT4001
The material of this course will allow listeners to study the processes, techniques, and tools for conducting forensic investigations of digital data in RAM. The course material also covers how to organize digital forensics processes and how to integrate them into the overall corporate cyber security architecture.
I'm interested →ANT4002
The material of this course will allow listeners to study the processes, techniques, and tools for conducting database forensic investigations. The course material also covers how to organize digital forensics processes and how to integrate them into the overall corporate cyber security architecture.
I'm interested →ANT4003
The material of this course will allow listeners to study the principles, mechanisms and tools for bypassing cyber security tools and systems during penetration testing – pentest – of the network infrastructure and its connected services and applications.
I'm interested →ANT4004
The material of this course will allow listeners to learn the principles and mechanisms of obtaining, processing and using information about cyber threats, cyber-attacks and their consequences - so-called Threat Intelligence information. Also, the course material reveals in detail the topic of Threat Intelligence not just from the position of obtaining the necessary information, but from the position of processes and their use to ensure corporate cyber security. In addition, the course material describes the design and integration of Threat Intelligence into corporate cyber security architecture.
I'm interested →