Course OverView

Cyberwarfare Certified Purple Team Analyst

Analyse various Host based attacks by Endpoint Monitoring solutions
Analyse various Network based attacks by Network Device monitoring solutions
Hunt Cyber Threats in a realistic enterprise environment
Collect Evidence & investigate Cyber Attacks using DFIR solutions
Visualize Protocol Level Attacks

Leave a Reply