Training – Cyber Threat Hunting
ZoomChris Brenton from Active Countermeasures is conducting another free, one-day, Cyber Threat Hunting Training online course. So far...We have had over 20,000 students […]
Chris Brenton from Active Countermeasures is conducting another free, one-day, Cyber Threat Hunting Training online course. So far...We have had over 20,000 students […]
So far we’ve had over 20,000 students attend our one-day network threat hunting course. Many have asked that we provide an extended class […]
You read that correctly, we are releasing a free version of our network threat hunting tool, AC-Hunter! As a community, we face an […]
Chris Brenton from Active Countermeasures is conducting another free, one-day, Cyber Threat Hunting Training online course. This is a new and improved version […]
Chris Brenton from Active Countermeasures is conducting another free, one-day, Cyber Threat Hunting Training online course. This is a new and improved version […]
Have you heard of the PROMPT# Magazine? It's a Free Infosec zine created by Black Hill Information Security. The most recent issue was […]
Chris Brenton from Active Countermeasures is conducting another free, one-day, Cyber Threat Hunting Training online course. This is a new and improved version […]
Chris Brenton from Active Countermeasures is conducting another free, one-day, Cyber Threat Hunting Training online course. This is a new and improved version […]
Chris Brenton from Active Countermeasures is conducting another free, one-day, Cyber Threat Hunting Training online course. This is a new and improved version […]
Chris and Bill are seasoned networking adventurers with years of expertise, fearlessly exploring the realms of connectivity and safeguarding digital domains through their […]
Chris Brenton from Active Countermeasures is conducting another free, one-day, Cyber Threat Hunting Training online course. This is a new and improved version […]
In this free, one-day (6-hours) course, we will cover how to leverage network and host data to perform a cyber threat hunt. The […]