To unbox your Christmas gift click here! | OFFER ENDING In : Y D H M S Grab Your Gift X

An Integrated Approaches To Malware Hunting [Webinar]

An Exclusive webinar to understand the approach and mode of hunting a malware incident on a Security Operation Center. This webinar walks you through the reasons behind of getting hacked, the ransomware life cycle and its kill chain. The extreme focus of the webinar is given in regards to an Incident Response teams action and their plans on diving deep to detect and respond to malware incident. In this session, it will be well defining the process through which a SOC team needed to travel and what a SOC team should be made of.
Once on the definition level, we guide on how to building response plan and what should be its context. The detailing will go over the automation phase where we put our focus in highlighting and detailing about how to automate a SOC and the Incident Handling using playbooks and other security orchestration tools.

 Was on 30th March 2018

  From 2:00 PM to 3:00 PM IST




  • Why are attacks successful
  • It’s Ransomware era.
  • Incident Handling phases
  • Incident Response Team and Planning
  • Malware Hunting and Root Cause Analysis.
  • Complete SOC Automation for Incident Handling

Blockchain – A Technical Primer [Webinar]

An Exclusive webinar to understand blockchain and the technical details on how does it works. This webinar details you on the algorithms used, and how is the blocks been interconnected and a lot more.

 Was on 20th April 2018




  • History of Blockchain
  • Distributed Ledgers
  • Detailing Blockchain
  • Blockchain Mechanics
  • Attacks
  • Use cases & Applications

Introduction to AWS Cloud Formation


 Was on 9th June 2018




  • Introduction to AWS CloudFormation
  • Working with AWS CloudFormation Templates
  • Using CloudFormation Stack and CloudFormation Designer for creating Stacks.

Introduction to GDPR (A to Z)


 Was on 30th June 2018




  • GDPR, its Terminologies and Concepts
  • Territorial and Material Scope of GDPR
  • Data Processing Principles
  • Data Subject Rights
  • Supervision and Enforcement
  • GDPR Through Examples

Introduction to CISSP 2018


 Was on 10th June 2018




  • What’s new in CISSP 2018
  • Inside Functionality of CAT

Security Automation and Orchestration with Open Source


 Was on 17th August 2018




  • Cyber Security Response is crucial for the organization
  • SAO is more of actionable intelligence
  • Drivers for organization evaluating SAO
  • Strategies required for security automation?
  • SAO Architecture
  • Open Source – Security Automation
  • Budgeting and ROI

AWS Cloud and MS Azure ( Basics)


 Was on 01st December 2018



Microsoft Azure

  • Getting Started with Microsoft Azure
  • Websites and Cloud Services
  • Virtual Machines
  • Virtual Networks
  • Cloud Storage

AWS Cloud

  • Introduction to AWS
  • Amazon S3 and Amazon Glacier Storage
  • Amazon Elastic Compute Cloud (Amazon EC2) and Amazon EBS
  • Amazon Virtual Private Cloud (Amazon VPC)
  • AWS Database Service
  • Amazon IAM (Identity And Access Management)

Internet of Things


 Was on 15th December 2018




  • What is IoT?
  • IoT Development – IoT security – IoT Analytics
  • How IoT is applied in different domains?
  • Use cases ranging from Smart Cities to IIoT
  • How large is the IoT Market in different domains?
  • IoT Technology stack
  • Sensors & Actuators
  • Hardware Platforms
  • IoT Operating System
  • Wireless Communication Protocols
  • Network communication Protocols
  • Cloud, its components and IoT
  • Implementation using MQTT protocol
Show Buttons
Hide Buttons