We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Digital Forensics Specialist

Demystifying Modern Fraud Attacks in Banking

Fang Yu explores the evolving tactics of fraudsters in online finance. This session covers popular banking fraud types, attack techniques, a detailed cash-out fraud case study, and how advanced technology can mitigate these threats effectively.

Course duration Duration: 30 minutes

PowerShell Skills

This course is for anyone wanting to learn how to write PowerShell scripts to automate tasks.

Course duration Duration: 7 hours, 30 min.

Linux Fundamentals for Certification

The Linux Fundamentals for Certification learning path provides essential Linux operating system skills and prepares you for entry-level Linux certification exams. You'll master core command-line operations and fundamental system administration concepts.

Course duration Duration: 74 hours, 15 min.

Mitigating the Evolving DDoS Threat Landscape

Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.

Course duration Duration: 10 minutes

Data Resilience for Insider Threat Protection

Chris Young explores strategies for defending against insider threats through data resilience measures and endpoint control, helping financial institutions protect sensitive information from internal risks.

Course duration Duration: 20 minutes

Real-Time Manufacturing Security with AI

Carlos Sanchez explores how global firewall deployments create automated threat detection networks, SOC automation addresses skills gaps and governance frameworks enable AI deployment in air-gapped OT environments.

Course duration Duration: 25 minutes

How Things Are Going for APT41 in 2024

Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.

Course duration Duration: 30 minutes

How Can We Maximize Visibility to Fight Threats?

Humayun Khan, Siham Eisele, Teemu Ylhäisi and Jari Rasinenwill discuss how modern threats exploit visibility gaps and methods for real-time threat detection through data analysis and correlation.

Course duration Duration: 40 minutes

Uncovering Insider Threats With Behavioral Analytics

Sherelle Moore of Toyota Financial, Suryaparkash Nalluri of Fortune 500 Financial and Shawn Tuma of Spencer Fane dive into behavioral analytics for insider threat detection using machine learning and anomaly detection algorithms.

Course duration Duration: 20 minutes

Learn How to Combat Adversaries

Mikkel Planck will share the latest insights from the frontline and reveal how adversaries are targeting organizations.

Course duration Duration: 30 minutes

Windows Threat Hunting

Rohit Shrivastava of Barclays shares expertise on conducting threat hunting in Windows environments and building proactive defense strategies.

Course duration Duration: 20 minutes

Rise & Reinvention of Business Email Compromise

Join Michael DeNicola in a conversation about social engineering tactics and what organizations can do to thwart them.

Course duration Duration: 15 minutes

DDoS Threats to Healthcare Providers: Strategies for Defense

Neal Quinn of Radware examines AI-powered DDoS attacks in healthcare, offering practical defense strategies and real-world case studies of successful threat mitigation.

Course duration Duration: 30 minutes

Enabling Business Growth in the VUCA World

Join Satyavathi Divadari, Shyam Krishnamurthy, Bastin Robin and Visagan Subburayalu in a discussion of growth and ambiguity in unprecedented times in the cybersecurity industry.

Course duration Duration: 30 minutes

SaaS for Cyber Core Services: Are CISOs Tuned In?

Join Shobha Jagatpal in a discussion of the cloud, security, network operations, threat detection and response.

Course duration Duration: 25 minutes

Defending Against Cyber Attacks with AI & ML

Join Ram Vaidyanathan, Product Marketing Manager - IT Security and SIEM Solutions, ManageEngine in a discussion about using AI and ML to defend Against Cybersecurity Attacks.

Course duration Duration: 30 minutes

Third-Party Risk & Emerging Supply Chain Threats

Dom Lucas of British International Investment and Brian Brackenborough of Channel 4 discuss advanced strategies for supply chain security, drawing key lessons from recent high-profile breaches including the 2024 UK MOD incident.

Course duration Duration: 30 minutes

Global Security Challenges & Opportunities in 2023

Join Mrutyunjay Mahapatra as he explores Global Security Challenges and Opportunities.

Course duration Duration: 30 minutes

Reducing Attack Surface, Controlling AD & Fighting Fatigue

Quest Software's Sivaramakrishnan Krishnamurthy covers Active Directory monitoring, identity management, and authentication tools for risk mitigation.

Course duration Duration: 20 minutes

Updating Your Cybersecurity Strategy in the New World

Join Sumnesh Joshi in a discussion of cybersecurity strategy to fight today’s hybrid warfare.

Course duration Duration: 20 minutes

Proactive Security Posture Against Evolving Adversaries

La Monte Yarborough of HHS, Laura Deaner of Northwestern Mutual and Preston Miller of Palo Alto Networks discuss emerging threats, zero-day attacks and leveraging AI/ML for threat detection.

Course duration Duration: 25 minutes

Enhancing Advanced Threat Prevention with Multiscanning

OPSWAT's Manish Gautam explains implementing multiscanning techniques for enhanced threat detection and endpoint security in perimeterless environments.

Course duration Duration: 15 minutes

Reducing Risk Through Automated Threat Profiling

Lance Moraitis-Jones from Recorded Future delves into automated threat profiling implementation, exploring dynamic prioritization methods and practical strategies for enhancing organizational security.

Course duration Duration: 30 minutes

The Future of Ransomware & Evolving Attacks

Join Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.

Course duration Duration: 30 minutes
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement
Ask Apollo a question?

Floating Button