An exclusive insight into the security operations centre vulnerability... 18 Aug 2020 Curious about what goes on in our Security Operations Centre (SOC)? Get an exclusive insight into our SOC... Read more
PoshC2 7 Aug 2020 PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral... Read more
The SOC visibility triad - SIEM, EDR and NDR 4 Aug 2020 The point of the SOC Visibility Triad is that each component augments the others; both false positives and... Read more
How to use docker in your penetration testing endeavours 31 Jul 2020 In the following post, we've sat down with Kirk Hayes; Senior Security Consult in the US, to... Read more
An introduction to SOC monitor services 27 Jul 2020 Threat actors may strike at any time with techniques your current technology stack is not designed to stop.... Read more
How to prepare for the CMMC 23 Jul 2020 For many defense suppliers, CMMC is just another headache. In this post, we explain how organizations can be... Read more
The cost of malware and its impact on business 21 Jul 2020 Loss of revenue from downtime and emergency remediation can exacerbate any budget. In this post, we discuss the... Read more
The importance of network security consulting 17 Jul 2020 The specialist skills that today's complex networks' demand place stress on small IT teams. There's no substitute for... Read more
Cyber security and the industrial internet of things: protecting... 15 Jul 2020 Find out about IoT-enabled industrial control systems for critical infrastructure - energy, transport, the built environment and manufacturing... Read more
AS 9100 & ISO 9001 QMS: Get value from... 15 Jul 2020 ISO 9001 and AS 9100 quality management systems: Four ways to get more value from your internal audits. Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*