Cybersecurity Training

We provide cybersecurity training both in-person and remotely throughout Australia and New Zealand, including to organisations in Melbourne, Sydney, Canberra, Brisbane, Darwin, Perth, Hobart, Wellington, Christchurch and Auckland.

Introduction to STIX, TAXII and CybOX

Introduction to STIX, TAXII and CybOX

Start effectively using STIX, TAXII and CybOX.

STIX, TAXII and CybOX are community-championed specifications for threat data sharing, promising to make sharing within and between organisations much easier.

CSIRT / SOC Fundamentals

CSIRT / SOC Fundamentals

Set your new CSIRT on the path to success.

Learn the fundamentals of establishing a CSIRT, the functions of a CSIRT, and how to operate a CSIRT efficiently.

Open Source Security Orchestration - Automating the Boring Stuff

Open Source Security Orchestration - Automating the Boring Stuff

Automate grunt work with workflows, playbooks and integrations.

Learn how to use open source tooling to automate the contextualisation and remediation of security threats in your environment.

Using ATT&CK to Map Threat Intelligence to Detections

Using ATT&CK to Map Threat Intelligence to Detections

Harness the MITRE ATT&CK matrix to your advantage.

This workshop will walk through the anatomy of an incident, from mapping incident stages to the ATT&CK tactics and techniques.

Open Source Intelligence for SOC Analysts

Open Source Intelligence for SOC Analysts

Tap into the power of OSINT.

In this workshop we'll look at what information can be used to perform OSINT and some common tools that can be used to investigate information further.

Threat Hunting for Windows Persistence Artefacts

Threat Hunting for Windows Persistence Artefacts

Detect the most common persistence mechanisms.

There are many ways for a threat actor to maintain persistence in Windows systems. We'll take a look at some common persistence mechanisms, where to look and what can be done to detect them.

MISP Basics: How and Why

MISP Basics: How and Why

Develop competency with MISP.

A comprehensive crash course on how to effectively use MISP for cyber threat intelligence. Cosive staff have served as MISP subject matter experts on major MISP projects including the CTIS initiative spearheaded by the ACSC.

No items found.