In this video, John Strand discusses the concept and strategies around Cyber deception. They explore the use of deception technology in cybersecurity, clarifying that it does not involve illegal activities such as hacking back but is aimed at increasing the effort required for an attacker to succeed.
Last chance to register for Industrial Control Systems Course! This is your final opportunity to register for “Introduction to Industrial Control Systems” with Ashley Van Hoesen! Registration Deadline: Tonight, May 22, 2023 at 10 PM EST! Course Highlights: Invest in your professional growth and take the …
Join us for the upcoming run of the “Professionally Evil Application Security (PEAS)” course with Kevin Johnson! Course Duration: 5 days (July 31 – August 4)Price: $720 (Includes 12 months access to the cyber range) In this course, Kevin Johnson will guide you through the world …
Exciting Announcement! Join us for the upcoming run of “Professionally Evil Container Security (PECSEC)” with cybersecurity expert Cory Sabol. Mark your calendars for July 11-12, as we dive deep into the world of container security during 2-day course. As part of the course, you’ll receive 6-month …