Infosec Boot Camps offer live, instructor-led cybersecurity and IT certification training in-person or online.
Infosec Self-Paced Training accommodates your schedule with instructor-guided, on-demand training.
The Infosec Intensive Cybersecurity Training program kickstarts cybersecurity careers in as little as 26 weeks with tailored training.
Infosec Skills provides on-demand cybersecurity training mapped to skill or role paths for any level.
Advance your team's cybersecurity skills with our customizable, industry-recognized programs and take advantage of our team training discounts.
We offer multiple ways to save when it comes to training and certifying your team.
Empower employees with knowledge and skills to stay cyber secure at work and home with 2,000+ security awareness resources.
Our human risk management solution, Infosec HRM, powered by Right-Hand Cybersecurity, increases visibility into security risk and provides alert-based training nudges to improve employee behaviors and decrease security events.
Security education to the right people from IT and security staff to the C-suite and every employee.
Skills and certifications your team should get next with training mapped to NIST and NICE Frameworks.
Flexible, scalable training solutions that add value to your client services portfolio and reduce business risk.
We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber safe at work and home.
September 29, 2017
In the previous part of this article series, we have seen some basics and initial concepts around analyzing Malicious files. In this part of article series,
September 28, 2017
Spreading of malware through malicious documents is not new but considering how malware authors use different techniques has become challenging for malware a
July 26, 2017
The document below is an initial level analysis of the recent Petya Ransomware (2017). We will also discuss an analysis of a dll variant of the ransomware.
July 24, 2017
Software: IDA Pro Free (v 5.0) DLL Name: Test.dll[pkadzone zone="main_top"] Story about DLL: This DLL is reportedly scanning the system for running the proc
June 13, 2017
For last few articles, we have seen how malware employs some anti-analysis techniques and how we can bypass those techniques. Now, let's raise the bar a bit
June 7, 2017
In continuation to previous articles, this article will also show a more sophisticated approach used by malware to thwart anti-analysis techniques. Let's sta
May 11, 2017
In continuation to the previous article on how malware can evade normal detections and how analysts can bypass those techniques now let's look at some even m
May 2, 2017
This article series will focus on various anti-analysis techniques used by malware, and then we will discuss various ways in which the anti-analysis techniqu
April 24, 2017
In this article, we will look at how what shellcode is, what is its purpose and various shellcode patterns, etc. Please note that this article will not cover
April 21, 2017
In this article, we are going to learn about a very interesting and powerful technique known as Domain Fronting which is a circumvention technique based on H
April 19, 2017
In Part 1 of this article, we have looked at the memory forensics power during the enumeration of forensically important objects like PROCESS, VAD nodes, MEM
April 17, 2017
Since we live in a digital world, it becomes utmost important for digital environment to be secure so that we can operate safely and reliably. So often we ha