CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree
CyberSecurity engineer
With advances in cybersecurity technology and diversified solutions providing protection from attackers, adversaries need more meticulously planned operations to hide their footprints. These surreptitious tactics leverage the power of operating systems and other trusted tools to achieve its malicious goals, such as the fileless malware attack.
By practicing of incident response, you will understand the various TTPs of APT attack.Learn how to resolve the encoded content of script and find the way of persistence, lateral movement and how the shellcode is loaded.
You will be devided into teams and help each other to see the whole scope of incident from an single alert.
By practicing of incident response, you will understand the various TTPs of APT attack.Learn how to resolve the encoded content of script and find the way of persistence, lateral movement and how the shellcode is loaded.
You will be devided into teams and help each other to see the whole scope of incident from an single alert.