top of page
group of adult students sitting at a large table working on computers and discussing _edit

Cybersecurity Training

Training and workshops for cybersecurity professionals and businesses looking to enhance their skillset

Learn From Industry Experts

Let our team train your team. Our experts have over 100 combined years of cyber security experience in both the public and private sectors. The training we offer ranges from basic best practices and guidelines that should be a part of every organization's required annual training to developing custom exploits and more. We can even create and tailor our training to meet the needs of your organization. Contact us to learn more about how our training can give you the edge you need.

Upcoming Trainings

SOC Analyst Tier 1 Training: Triage Specialist

Level: Basic

Format: Live! Online Class 

Date: December 15, 2023

Times: 9am - 5pm EST

Description:

Interested in breaking into the Cybersecurity industry but not sure how or where to begin? A SOC Analyst position is the perfect place to start! A SOC, Security Operations Center, is responsible for monitoring security data across one or more organizations. Traditionally, SOC shifts and roles are split into multiple tiers based on levels of experience and escalation models. A SOC Tier 1 Analyst sits on the frontlines of enterprise cyber defense...

Event Image - Wix Side by Side 800 x 800 - SOC Analyst Triage Specialist Training - Polito
Threat Hunting & Adversary Emulation Training

Level: Intermediate

Format: In-Person & Online options

Date: TBD

Times: TBD

Description:

This hands-on training will walk students through performing common Tactics, Techniques, and Procedures (TTPs) frequently used by ransomware threat actors during an attack. From Reconnaissance and Initial Access to Exfiltration and Impact, students will be exposed to a typical ransomware attack lifecycle while being able to leverage attack TTPs including commands, scripts, tools, communication channels, and techniques that we frequently see and use in the wild. TTPs will be mapped to the MITRE ATT&CK Framework, and will be inspired by ATT&CK's Adversary Emulation Plans.

ELK-logo-with-background-watermark.jpg

Past Conference Workshops

We're honored to have been chosen to present our Threat Hunting with the Elastic Stack workshop and Ransomware ATT&CK and Defense with the Elastic Stack, among other talks, at several leading cybersecurity conferences.

​

If you're interested in private training for your team or organization, please contact us.

August 12, 2022

​

Presented our Ransomware ATT&CK and Defense with the Elastic Stack workshop

August 9, 2019

​

Presented our Threat Hunting with the Elastic Stack workshop

​

Presented our Hacking the Android APK workshop

April 29, 2018

​

Presented our Threat Hunting with the Elastic Stack workshop

August 7, 2021

​

Presented our Ransomware ATT&CK and Defense with the Elastic Stack workshop

August 10, 2018

​

Presented our Threat Hunting with the Elastic Stack workshop

April 14, 2018

​

Presented our Threat Hunting with the Elastic Stack workshop

August 7, 2020

​

Presented our Threat Hunting with the Elastic Stack workshop

June 1, 2018

​

Presented our Threat Hunting with the Elastic Stack workshop

bottom of page