Infosec Boot Camps offer live, instructor-led cybersecurity and IT certification training in-person or online.
Infosec Self-Paced Training accommodates your schedule with instructor-guided, on-demand training.
The Infosec Intensive Cybersecurity Training program kickstarts cybersecurity careers in as little as 26 weeks with tailored training.
Infosec Skills provides on-demand cybersecurity training mapped to skill or role paths for any level.
Advance your team's cybersecurity skills with our customizable, industry-recognized programs and take advantage of our team training discounts.
We offer multiple ways to save when it comes to training and certifying your team.
Empower employees with knowledge and skills to stay cyber secure at work and home with 2,000+ security awareness resources.
Our human risk management solution, Infosec HRM, powered by Right-Hand Cybersecurity, increases visibility into security risk and provides alert-based training nudges to improve employee behaviors and decrease security events.
Security education to the right people from IT and security staff to the C-suite and every employee.
Skills and certifications your team should get next with training mapped to NIST and NICE Frameworks.
Flexible, scalable training solutions that add value to your client services portfolio and reduce business risk.
We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber safe at work and home.
March 22, 2017
In Part 1 of this series, we looked at PowerShell remoting artifacts under various Event IDs and ways to gather more information from those events and relate
March 15, 2017
Since PowerShell usage by malware is on the rise, in this article series, we will learn about the various artifacts related to PowerShell remoting that can b
February 14, 2017
In this part of the article series, we will look how we can look at the inner workings of a malware. In part 1 and part 2 we have worked on the behavioral an
February 10, 2017
As we know, organizations are prone to data breaches, and even though organizations are becoming serious about their security posture, they are often attacke
February 9, 2017
In Part 1, we have seen that how to perform behavioral analysis on a malicious specimen. In this article, we will look at another specimen and perform behavi
January 31, 2017
In this article series, we will learn about malware behavioral and code analysis. For part 1, I will cover behavioral analysis of one of the specimens. Behav
November 3, 2016
In Part 1 of this article series, we had a look at the ways to recognize packed executables and various ways to automate the unpacking process. In this artic
October 28, 2016
In this article series, we will learn about the characteristics possessed by a packed malware specimen and how to unpack them. In the unpacking section, we w
October 24, 2016
In my earlier article, I have listed out ways how to enumerate different structures like page tables, processes, VAD, PEB, etc. (For more information on thes
October 7, 2016
In the previous article, we discussed some important GUI objects like session, window stations, and desktops. As we saw earlier memory forensics of GUI objec
October 3, 2016
In this article series, we will take a look at the Windows GUI forensics which is often not discussed. We will take a look at the various structures and how
September 1, 2016
In Part One of this article, we learned about two injection techniques such as remote DLL injection and hollow process injection. In this article, we will le