1201 Peachtree Street NE, Suite 200, Atlanta, United States, 30361
Atlanta, GA – Regus at Colony Squar
Atlanta, GA – The Proscenium
1170 Peachtree Street NE, Atlanta, United States, 30309
Decatur, GA – Regus at One West Court Square
One West Court Square, Suite 750, Decatur, United States, 30030
Atlanta, GA – Regus at One Hartsfield
100 Hartsfield Centre Parkway, Suite 500, Atlanta, United States, 30354
Atlanta, GA – Regus at Peachtree
260 Peachtree Street NW, Suite 2200, Atlanta, United States, 30303
Augusta, GA – At Broad Street
823 Broad Street, Augusta, United States, 3090
Savannah, GA – Regus at Bull Street
100 Bull St Downtown, Suite 200, Savannah, United States, 31401
Subcategories (1)
Explore Our Courses
Cyber Threat Intelligence
35 HoursJunior Detection Engineer Essentials
21 HoursCertified Incident Handler
21 HoursBug Bounty Hunting
21 HoursDuty Managers Cyber Resilience
14 HoursDigital Investigations - Advanced
21 HoursEthical Hacker
35 HoursCertified Lead Ethical Hacker
35 HoursMalware Analysis (PCAP)
35 HoursMITRE ATT&CK
7 HoursSocial Engineering
14 HoursLast Updated:
Testimonials (5)
Clarity and pace of explanations
Federica Galeazzi - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
It did give me the insight what I needed :) I am starting teaching on a BTEC Level 3 qualification and wanted to widen my knowledge in this area.
Otilia Pasareti - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
The instructor has a very wide range of knowledge and is committed to what he does. He is able to interest the listener with his course. The scope of the training fully met my expectations.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.