In this webinar, you will learn about the Offensive Security Proving Grounds (PG). They are a modern network for practicing penetration testing skills on exploitable, real-world vectors. They’re based on the course labs featured in the pentesting course for the OSCP certification, Penetration Testing with Kali Linux (PWK).
The labs simulate a complete enterprise network containing dozens of exploit points, ranging in difficulty from simple to sophisticated. They serve as a battleground for penetration testers and enterprise teams to practice, learn, and improve in a realistic environment.
Discover how you can develop and hone your penetration testing skills against situations and surfaces they would encounter on a real pen test – and within the most robust enterprise network simulation available on the market.
Catch me if you can! - Seeing the Red through the Blue
10th, 11th, 12th, 13th and 14th
This multi-series set of bite size workshops, over 1 week, which will help improve both red and blue skillsets through a series of hacks, where you as an attendee will have to identify malicious activities on a series of targets. Over the training segments, the trainer (Red Team) will perform a series of attacks on the hosts within the In.security lab, running commands, tools and techniques used in the field. You (the Blue Team) will then need to use our ELK stack to identify the malicious activities and raise the alarm! This will upskill both attackers in understanding the various attack flows that could compromise their cover and defenders in understanding how to detect them.
“The best defence is a good offense” applies as much in cyber as it does in sport. You’ll get sneak peeks of the attacks the trainer carries out before you’re set off to hunt down the evidence and this heightened mind-set will subsequently up your game in the field to better detect the traces, logs and data that can give an attacker away.
Day 1: 10 Aug, Session 1 – 12:30-13:00 Lab access and overview Auditing Windows, Linux and network devices Intro to the ELK stack, Sysmon, logging and monitoring Using Kibana to find artefacts Practical scenario (demo-led to introduce lab environment) Brute-force attacks have been performed - Identify targeted and compromised user accounts
Day 2: 11 Aug, Session 2 – 12:30-13:00 Phishing attacks and IOC’s Practical scenario Malicious emails have been sent – catch the phish
Day 3: 12 Aug, Session 3 – 12:30-13:00 Demo-led solution of session 2 Credential theft Practical scenario Identifying credential-based attacks and compromised accounts
Day 4: 13 Aug, Session 4 – 12:30-13:00 Demo-led solution of session 3 Lateral movement and pivoting within the enterprise Practical scenario Identifying post exploitation and lateral movement attacks
Day 5: 14 Aug, Session 5 – 12:30-13:00 Demo-led solution of session 4 Using Out of Band (OOB) channels to exfiltrate data Practical scenario Identifying suspicious connections using visualisations Demo-led solution of session
Join us for an hour where we highlight aspects of social engineering, explaining some of the most used and feared attacks used against UK businesses. You will hear from our principal consultant as he transfers a few key elements from our advanced social engineering course. Make sure to click the link and sign up, don’t worry this is not a test!
We will focus on readily available technology that is commonly used by social engineers to manipulate employees and exfiltrate data from unsuspecting companies. The session requires no prior experience of social engineering and will be a great opening for further learning.
Many people think of Blockchain of the technology that powers bitcoin while this was its original purpose Blockchain capable of so much more. During this webinar we will breakdown the reasons why Blockchain technology will revolutionise the way we interact with each other. We will explain how and why Blockchain was designed to be decentralised and distributed across a large network of computers. How it reduces the ability for data tampering and modification and ultimately how the Blockchain creates trust in the data.
Many organisations today face many cyber and information security risks and are required to comply with multiple standards, regulations and laws. Often all of these compliance requirements and risk management approaches are managed independently in silos leading to duplication, confusion and many inefficiencies. In this webinar we will explore how an ISO 27001 ISMS can be used to build an effective security programme which allows one system to address risk and compliance all in one place.
This online digital cyber safety awareness webinar is designed to make delegates aware of the online threat and vulnerabilities. How to stay safe in a cyber digital world. We will show you how easy it can be for others to obtain data about ourselves through various means, but also how much of this can be stopped with a few tweaks to our digital devices and our some subtle changes to our digital behaviours.
When we connect to the internet and use the WWW, our devices leave a trail of digital data that can be used to identify and expose our online activities. By understanding what these digital breadcrumbs are, we can take steps to remove or alter them so that they become useless to others.
If a stranger came up to you on the street, would you give them your name, National Insurance Number, e-mail address, date of birth or other such information? Probably not! Yet people give out this sort of personal information on the Internet every single day, often without a second thought about what happens to it once the send or post button has been pressed.
The personal comments we make in our digital interactions at work and home can affect the systems and services we use. Careless disclosure (knowingly and unwittingly) on social sites and forums can allow hackers to leverage their way into our digital lives and work.
Our mobile devices have numerous inherent security weaknesses out of the box, learn about mobile device privacy and security.
This exclusive career workshop (webinar) hosted by The CV & Interview Advisors; international speakers and thought-leaders on all things related to finding a new job and enhancing your career.
This 60 min webinar will provide leading-edge information on creating a high-impact CV that will significantly increase interview rates and help you secure a new position. Specifically aimed at cyber security professionals, this will be much more than a boring top 10 tips session – previous webinars have been described as “outstanding” and “truly inspirational”.
In this fast-paced and engaging webinar you will learn how to:
✔️ Create a highly effective CV which will genuinely open doors and drive interviews for top cyber jobs ✔️ Use marketing techniques such as keyword optimisation and social proofing ✔️ Save time by creating a CV that takes just minutes to tailor for each role ✔️ Transform your CV into a powerful business case that will drive more job offers ✔️ Harness the power of case studies in your CV to help you negotiate a higher salary ✔️ Create a winning opening summary that instantly gets recruiter's attention ✔️ The things that cyber security professionals should NEVER do on their CV
Job seekers that attend our free one-hour session are on average 3 times more likely to secure a highly remunerated job
“Following the webinar, I have spent that last week re-writing my CV in the format you discussed - then put it online last night. Today, I have received 3 emails from recruiters who want to deliver my CV to their clients. Alongside this I have had 2 calls from companies who have invited me in for a chat about vacancies. Testament to the success of your webinar.”
This is a live webinar with a Q&A session at the end for you to ask any questions.