RC18 @ Human+

Combating Cyber Extortion
This comprehensive training provides a deep dive into the multifaceted landscape of ransomware attacks and equips cybersecurity professionals with the necessary knowledge and skills to effectively mitigate this pervasive threat.

Participants will gain insights into the evolution and history of ransomware, understanding its origins and the transformation into a highly profitable criminal enterprise. Delving into the mechanics of ransomware attacks, including the various types such as encrypting ransomware, locker ransomware, and mobile ransomware, participants will grasp the breadth of techniques employed by malicious actors.

Additionally, the training examines the top targeted organizations and the emergence of Ransomware-as-a-Service (RaaS), shedding light on the evolving nature of ransomware tactics.

Student Requirements
- Basic knowledge of computers and networking
- Familiarity with the Windows operating system

Target Audience
Defenders, Sysadmins, Security Researchers, IT Managers, Developers

Trainer Bio
Ashish Bhangale
Ashish Bhangale is a Senior Security Researcher at INE. Prior to joining INE, He was working as a senior security researcher at Pentester Academy (Acquired by INE). He has 10+ years of experience in Network and Web Application Security. He has also worked with the state law enforcement agencies in the capacity of a Digital Forensics Investigator and was instrumental in solving IT fraud/crime cases. He has presented/published his work at Blackhat, DEFCON USA/China, Wireless Village and IoT Village. He has conducted multiple Network and Windows Security Trainings. He has contributed to many innovative research projects like Chigula (WiFi Forensics Framework) and Chellam (First pure WiFi Firewall) frameworks and created multiple projects like Vulnerable Web Application OSes, Vulnerable Router Project and Damn Vulnerable Wordpress. His areas of interest include Advanced Pentesting, Forensics, WiFi and AD security.

Shantanu Kale
Shantanu Kale is the Infrastructure Lead, Lab Platform at INE with strong roots in Cloud, Linux, and Web Application Security. He has published his work in BlackHat USA/ASIA, Defcon DemoLabs and has been a co-trainer in Cloud Security and Network Penetration testing trainings. He has led teams for various national-level hackathons, including the Smart India Hackathon conducted by GoI. His areas of interest include Advanced Pentesting, Cloud Security, Malware Analysis, Cryptography, Web Application Security, and AD Security.

Cyber Defense Analyst (OSDA Starter Course)
The OffSec workshop will be covering the key topics in the SOC200 course. It consists of four x 45 minute teaching sessions and three one-hour hands-on exercises. The teaching topics

- An understanding of the NICE framework of skills, knowledge and tasks expected of a Cyber Defense Analyst
- An introduction to the internal features of Windows endpoints, and in particular the event logs which are generated
- An introduction to the internal features of Linux endpoints and the system logs which are generated
An understanding of cyber attack methodologies and specific forms of attack against Windows and Linux endpoints and how these can be diagnosed through log analysis

Student Requirements
- Linux Basics
- Windows Basics
- Networking Basics

Target Audience
Security Operations Center (SOC) Tier 1, Tier 2 and Tier 3 Analysts
Anyone interested in detection and security operations, and/or committed to the defense or security of enterprise networks

Trainer Bio
Dr Malcolm Shore
Dr Malcolm Shore is British by birth – a Yorkshireman - and Kiwi by nature. He has had a varied career covering government and industry, with the opportunity for adjunct spells in academia both teaching and supervising research. He held a commission in the New Zealand Air Force retiring as a Squadron Leader, and subsequently New Zealand’s national information security program as Director Infosec at GCSB. He has held CSO roles in the telecommunications sector in both Australia and New Zealand, and was Technical Director for BAE Systems Applied Intelligence (Australia).

At a technical level, Malcolm has a background in programming in languages such as Fortran, Cobol, Algol68, C, Pascal, and Python. He has worked in machine code and assembly code on Atmel and ARM chips. In addition to running corporate security teams, he has managed technical teams doing penetration testing, reverse engineering, and Common Criteria evaluation

Malcolm was instrumental in the development of the Australian Certificate IV in Cybersecurity, and developed and taught in the Canterbury University, NZ post graduate diploma in security and forensics. He has held adjunct positions in Australia at the University of NSW and is currently Adjunct Professor at Deakin University’s Centre for Cybersecurity Research and Innovation. Malcolm is a prolific author of Linkedin Learning cybersecurity courses and is currently a developer for Offensive Security focusing mainly on building out the OSDA Certification courseware and labs.