Infosec Boot Camps offer live, instructor-led cybersecurity and IT certification training in-person or online.
Infosec Self-Paced Training accommodates your schedule with instructor-guided, on-demand training.
Infosec Immersive Boot Camps kickstart cybersecurity careers with tailored training in as little as 26 weeks.
Infosec Skills provides on-demand cybersecurity training mapped to skill or role paths for any level.
Advance your team's cybersecurity skills with our customizable, industry-recognized programs and take advantage of our team training discounts.
We offer multiple ways to save when it comes to training and certifying your team.
Empower employees with knowledge and skills to stay cyber secure at work and home with 2,000+ security awareness resources.
Our human risk management solution, Infosec HRM, powered by Right-Hand Cybersecurity, increases visibility into security risk and provides alert-based training nudges to improve employee behaviors and decrease security events.
Security education to the right people from IT and security staff to the C-suite and every employee.
Skills and certifications your team should get next with training mapped to NIST and NICE Frameworks.
Flexible, scalable training solutions that add value to your client services portfolio and reduce business risk.
We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber safe at work and home.
November 28, 2017
A screen locker is a malware in which the primary purpose is to lock the victim's screen by displaying a fearful message designed to invoke a high level of f
March 22, 2017
In this second article on the dropper, we will resume our analysis right where we left off: the decryption of the key and data. After the decryption, two str
March 13, 2017
Avatar was first detected by ESET circulating in the wild in early 2013 [1]. However, no samples were collected for analysis until May of the same year. ESET
August 26, 2016
In the previous part, we stopped right at when the decision of which approach to use to encrypt the data, i.e. either Petya or Mischa. In this article, we wi
July 20, 2016
Introduction What makes Petya a special ransomware is that it doesn't aim to encrypt each file individually, but aims for low-level disk encryption. In this
January 11, 2016
Introduction: In the second part of this analysis, we will be exploring how Pony steals data and how it sends it to the C&C server. We are equally intere
December 3, 2015
Introduction: A stealer is a type of malware that looks for passwords stored on the machine and sends them remotely (e.g. mail, HTTP) to an attacker. Most st
September 29, 2015
In code obfuscation, a virtual machine is a mechanism used to execute a different instruction set than the one used by machine that runs the program. For exa
August 30, 2013
Introduction : A key generator or a Keygen is a computer program that will generate a valid « Product Serial or Key » in order to completely register a soft