This module offers a comprehensive course focused on red teaming, where students are not only taught but also actively engage in performing a variety of realistic attacks. The purpose of this course is to provide hands-on experience and in-depth knowledge of red teaming methodologies and techniques, empowering students to simulate real-world cyber attacks against background healthcare infrastructure such as an active directory environment.
- Trainer/in: Christos Grigoriadis
This module offers a comprehensive course focused on red teaming, where students are not only taught but also actively engage in performing a variety of realistic attacks. The purpose of this course is to provide hands-on experience and in-depth knowledge of red teaming methodologies and techniques, empowering students to simulate real-world cyber attacks against an active directory environment.
- Trainer/in: Christos Grigoriadis
This hands-on training will provide participants with the skills and knowledge they need to use Nessus to perform basic and advanced network vulnerability assessments. Participants will learn how to install and configure Nessus, create and run scans, interpret scan results, and generate reports. They will also learn about Nessus licensing options, security and privacy considerations, and best practices for scanning different types of networks.
-------------
In this training, you will learn:
o Understand the features and benefits of Nessus
o Install and configure Nessus
o Create and run different types of Nessus scans
o Interpret Nessus scan results and generate reports
o Understand Nessus licensing options and security and privacy considerations
o Apply best practices for scanning different types of networks
- Trainer/in: Paresh Rathod
Penetration testing is the process of evaluating the security of a computer system or network by simulating the attacks of a malicious actor. It is a critical part of any information security program, as it can help to identify and remediate vulnerabilities before they can be exploited by attackers.
Nmap is a free and open-source network discovery and security auditing tool. It is one of the most popular tools used by penetration testers, and it is essential for understanding the network infrastructure of a target system.
-------------
In this training, you will learn:
o What penetration testing is and why it is important
o The different types of penetration testing
o The tools and techniques used by penetration testers
o How to use Nmap to discover and map networks
o How to identify vulnerabilities in networks and systems
o This training is ideal for anyone who wants to learn more about penetration testing or who wants to improve their Nmap skills.
- Trainer/in: Ric Lugo
- Trainer/in: Paulinus Ofem
- Trainer/in: Paresh Rathod
This workshop focused on penetration testing and red teaming, where students are not only taught but also provided with demo in performing a variety of realistic attacks. The purpose of this course is to provide in-depth knowledge of red teaming methodologies and techniques, empowering students to simulate real-world cyber attacks against background healthcare infrastructure such as an active directory environment.
- Trainer/in: Christos Grigoriadis
- Trainer/in: Kitty Kioskli
- Trainer/in: Ric Lugo
- Trainer/in: Paulinus Ofem
- Trainer/in: Paresh Rathod
Topic-1: Introduction to Energy main sectors Cybersecurity
Topic-2: Security environment: the state of play
Topic-3: Binaries
Topic-4: Pen-Test.
- Trainer/in: Dimitris Koutras
blblblbl
- Trainer/in: Kitty Kioskli
- Trainer/in: Ric Lugo
- Trainer/in: Paresh Rathod
The Course CSP010_W_M_Pentesting for Maritime is a course that can be operated on a physical installation operated by an end-user. The course should be as reallistic as possible and aims at providing a training on AIS devices detained by an entity willing to improve the training of its personnel. It will help to identify spoofing or jamming of AIS and GNSS. During the activity a group of trainees (4 – 6 Pax) will have the opportunity to face the symptoms of attacks, simulated on the devices they are normally operating. Most often observed attacks of AIS (including attacks via GNSS) are simulated via a dedicated platform and presented to the audience during the course.
- Trainer/in: Bruno BENDER