DLL Injection: Part One 25 Feb 2015 DLL injection is a technique that can be used by legitimate software to add functionality, aid with debugging,... Read more
Traditional wireless vs. Cloud wireless solutions 19 Feb 2015 Read our blog around traditional and cloud wireless solutions, written by one of our very own consultants. Read more
A beginners' guide to obfuscation 11 Feb 2015 Obfuscation is a technique used to change software code in order to make it harder for a human... Read more
A Beginners’ Guide to Obfuscation 11 Feb 2015 Obfuscation is a technique used to change software code in order to make it harder for a human... Read more
Programmable Logic Controller (PLC) Security 30 Jan 2015 Industrial Control Systems (ICS) are very important components of our critical infrastructure. Programmable logic controllers (PLC) are some... Read more
Shellter – A Dynamic Shellcode Injector 25 Jan 2015 Recently, Shellter has been added to the official repository of Kali Linux. This is a very important milestone in the course... Read more
Bypassing av the easy way 11 Dec 2014 Protecting against malware which is constantly changing can be very challenging. However, there are a number of factors... Read more
Ebay hit by cross-site scripting (XSS) attack 18 Sep 2014 eBay is in the headlines once again this week as the online auction site has reportedly been compromised... Read more
Revising the Pressure Equipment Directive: Why now, & what’s... 5 Sep 2014 For the first time in 17 years, the EU's Pressure Equipment Directive (PED 97/23/EC) is changing. Read more
What is APT testing? 24 Jun 2014 Read out blog written by one of specialist consultants around APT Testing. Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*