New Products
LIVE online WORKSHOPS

Featured Products

Only a few seats remaining
$249.00
Only a few seats remaining
$33.00
Only a few seats remaining
$249.00

399 249 USD

3 seats in this price left

399 199 USD

2 seat in this price left

New eBook

399 159 USD

3 seat in this price left

Yannick Nanchan Atabong Official New Edition

Command and Control (C2): Understanding the Backbone of Cyber Attacks

In today's digital landscape, understanding the intricacies of cyber threats is more crucial than ever. Among the various stages of …

Oct 14, 2024

4 min read

Dr. Aneish Kumar

Lessons from SP Oswal and other recent Deep-fake Scams: How to combat sophisticated frauds

Scams in India are reaching a whole new level. Take the case of Sri S.P. Oswal, the 82-year-old chairman of …

Oct 10, 2024

4 min read

Dr. Aneish Kumar

The New Frontier of Scamming: How Real-Time Bidding is Fueling Fraud

This happened in Australia. A citizen recently received a text message that seemed to know exactly what they were up …

Oct 8, 2024

4 min read

Alexander Teggin Course

Personalized AI: How to Jailbreak, Train, and Customize your own AI Assistant (W78)

This hands-on course will teach you how to execute adversarial attacks on image classification models using techniques like : FGSM, BIM, CW, DeepFool, and PGD. You’ll gain practical experience, understand the vulnerabilities of AI systems, and learn how to protect them. Led by AI and cybersecurity expert Hugo Le Belzic, this workshop is ideal for both professionals and enthusiasts looking to deepen their knowledge of AI safety.

Sep 27, 2024

13 min read

Arash Habibi Lashkari

Defining Cybersecurity in Healthcare

With healthcare accounting for 34% of cyberattacks in 2023, the sector is a prime target for cybercriminals exploiting vulnerabilities. Cybersecurity …

Oct 7, 2024

4 min read

Yannick Nanchan Atabong Official New Edition

Command and Control (C2): Understanding the Backbone of Cyber Attacks

In today's digital landscape, understanding the intricacies of cyber threats is more crucial than ever. Among the various stages of …

Oct 14, 2024

4 min read

Joe Shenouda Official New Edition

AI-powered Incident Response

Let's dive into the world of AI-powered incident response in cybersecurity. I've always been fascinated by how AI can transform …

Sep 30, 2024

4 min read

Tarik Achoughi Official New Edition

AI in the Battle for Cybersecurity, Defender or Threat?

AI is changing the way we think about cybersecurity, but it also raises important questions about what happens when both …

Sep 30, 2024

4 min read

Dr. Charles Saroufim Official New Edition

Malware Analysis and Development in the age of AI

Artificial intelligence (AI) has revolutionized the way we think about efficiency, automation, and problem-solving in recent years, affecting sectors such …

Sep 27, 2024

4 min read

Alexander Teggin Course

Personalized AI: How to Jailbreak, Train, and Customize your own AI Assistant (W78)

This hands-on course will teach you how to execute adversarial attacks on image classification models using techniques like : FGSM, BIM, CW, DeepFool, and PGD. You’ll gain practical experience, understand the vulnerabilities of AI systems, and learn how to protect them. Led by AI and cybersecurity expert Hugo Le Belzic, this workshop is ideal for both professionals and enthusiasts looking to deepen their knowledge of AI safety.

Sep 27, 2024

10 min read

Hugo Le Belzic Course

Adversarial AI Attacks: Master Offensive Techniques on Image Classifiers (W77)

This hands-on course will teach you how to execute adversarial attacks on image classification models using techniques like : FGSM, BIM, CW, DeepFool, and PGD. You’ll gain practical experience, understand the vulnerabilities of AI systems, and learn how to protect them. Led by AI and cybersecurity expert Hugo Le Belzic, this workshop is ideal for both professionals and enthusiasts looking to deepen their knowledge of AI safety.

Sep 19, 2024

6 min read

Robert Thomas Course

Build Ethical Hacking Arsenal with ChatGPT-4o (W76)

AI is all over the news. Politicians are concerned about its potential for Hacking, Phishing and Malware. Is it true? Microsoft has found APTs using ChatGPT already. How good is it? As a Pentester, what are you missing out on? Might AI take over your job? Take this course to stay ahead.

May 31, 2024

9 min read

Atul Tiwari Course

Kubernetes Ethical Hacking (W75)

This course focuses on ethical hacking of Kubernetes, the leading container orchestration platform used by over 50% of organizations. Through simulating attacks, the course aims to identify and exploit vulnerabilities to assess and enhance the system’s security posture.

Apr 25, 2024

10 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023

Watch the rest of this video with a free account.

Already have an account? Sign in