Today, traditional approaches are failing daily in defending against conventional cyber attacks breaching organizations and governments. Worse, however, the latest “Poli-Cyber™” threats perpetrated by rogue states and extremist groups like ISIS/Daesh with the motivation to inflict maximum damage and/or destruction of the target for maximum publicity have caused a global paradigm change. This has added a new and exponentially greater threat level to an already unfixed and perplexing problem.
This global paradigm change and its new threat level are putting Survivability of stakeholders all over the world at significantly greater risk.
Fighting this, winning and securing Survivability requires an entirely new mindset, strategy, and an implementable solution – The MLi Group Survivability Solution™, MLiSS™
Why Do Governments & Organizations All Over The World Need MLiSS™ Cyber Training?
MLiSS™ Cyber Training is one of MLiSS™ key Pillars that adds critical and unique training knowledge and expertise to help stakeholders. Contact us to learn why MLiSS™ Cyber Training is unique and unlike other training programs.
MLiSS™ Cyber Training Programs
*Cyber Hygiene For C-Suite & Senior Executives
Training Program details will be subject to clients' needs and specifics. Askfor more details.
Fundamentals of information security (1) will be presented, ranging from identifying and blocking online threats (2) – spam, phishing, malvertising, drive-by attacks, banking malware to ways of protecting your workplace (3), your video and audio communications. Ask for more details.
L2 Penetration Testing – Basics
This level will cover introductory concepts (1) related to security testing of system. This will also include a refresher of networking concepts (2) – TCP and UDP protocols, network discovery, fire-walled services and banner grabbing. Reconnaissance tools and exploitation frameworks (3) will be presented. Ask for more details.
L3 Penetration Testing – Exploitation
This will cover the exploitation stage – how to find vulnerabilities (1) and use exploitation frameworks (2). An important aspect of the exploitation stage is understanding existing exploits and being able to reverse engineer and re-engineer payloads (3) to fit your target. Ask for more details.
L4 Penetration Testing – Post-exploitation
The post-exploitation session covers in depth various privilege escalation techniques on modern operating systems (1) , both Windows and Linux. Furthermore, achieving persistence (2) on target systems is discussed. Understanding attackers techniques is fundamental to protecting your own infrastructure. The last topic covered will be lateral movements (3) – leveraging already obtained access on a system to reach other potentially information-rich machines. Askfor more details.
L5 Penetration Testing – Advanced Exploitation
The highest stage covers advanced exploitation techniques needed to bypass modern exploit mitigation techniques (1) on properly configured modern operating systems. Windows and Linux will be discussed. The recent leaks clearly showed that when dealing with sufficiently motivated and persistent actors, recognising stealth techniques (2) becomes vital – masked system access, hidden remote connections and under-the-radar data exfiltration. Equally important to understand are various covering tracks techniques (3). Askfor more details.