Threat HUNTing Platform
Credential Risk Assessment and Remediation
ORKOS: Preventing the 9 steps to domain collapse
R9B understands the cognitive aspects of cyber operations. Our curriculum provides the hands-on technical skills students require to attain a variety of advanced cybersecurity qualifications. We instill the knowledge, skills, and abilities necessary for our students to defeat the adversary. Below are our available courses. Please check back often as our course offerings are updated regularly. Government organizations, please contact R9B directly via training@root9B.com for pricing and purchasing information.
HUNTing for malware and other signs of intrusion on computer networks is not a new concept. What started as a means of responding to a network breach has grown into a preventive process as necessary as firewalls, antivirus, the principle of least privilege, and everything else that fits into the definition of defense-in- depth. At its basic level, HUNTing is simply proactively looking for network anomalies and determining if they are malicious. Not unlike a shepherd guarding sheep, the R9B HUNT team watches for predators stalking important data and accessing valued resources. As predators advance, we learn from their techniques, adapt our defenses, and tailor a solution to stop them. The defender’s job is much more difficult than that of the predator. In the past, the information security community has viewed network defense as a purely technical problem. But in reality, it is an intelligence problem. Predators are always observing and gaining knowledge of their prey. It’s time for the prey to understand the predator’s environment, motives, and techniques in order to take back control and gain the upper hand […]
BACK TO NEWSROOM