0
×
Close
Update
or
delete
this event?
Close
Add to your calendar
Google Calendar
iCalendar / Outlook Calendar
Outlook.com Calendar
Yahoo! Calendar
×
Close
Confirm Event Deletion
The event can't be recovered after its deletion. Proceed anyway?
Yes
No
Home
Rocheston Certified Cybersecurity Engineer (Level 2)
Home
Rocheston Certified Cybersecurity Engineer (Level 2)
Home
Rocheston Certified Cybersecurity Engine ..
Rocheston Certified Cyber ..
Already in cart
School of Cybersecurity
Rocheston Certified Cybersecurity Engineer (Level 2)
There is no description for this course
Course content
Module 1: Sophisticated and Extremely Advanced Phishing Techniques Harvested by Chinese and Russian Hackers
Sophisticated and Extremely Advanced Phishing Techniques Harvested by Chinese and Russian Hackers
Module 2: Deep Network Insights for Deeper Analytics
Deep Network Insights for Deeper Analytics
Module 3: Read Privileged Kernel Memory and Leak Data to Escalate Privileges
Read Privileged Kernel Memory and Leak Data to Escalate Privileges
Module 4: Advanced Blockchain Exploits and Cryptocurrency Mining Attacks
Advanced Blockchain Exploits and Cryptocurrency Mining Attacks
Module 5: Sophisticated Government use of Cyberweapon Attacks and How they work
Sophisticated Government use of Cyberweapon Attacks and How they work
Module 6: Principles of Quantum Entanglement to Secure Communication (Unhackable networks)
Principles of Quantum Entanglement to Secure Communication (Unhackable networks)
Module 7: Guidance For Cybersecurity Disclosure and Advanced Techniques for Cyber Bounty hunting
Guidance For Cybersecurity Disclosure and Advanced Techniques for Cyber Bounty hunting
Module 8: Advanced Mobile Banking and ATM Trojans
Advanced Mobile Banking and ATM Trojans
Module 9: Quantum Computing and Cryptography
Quantum Computing and Cryptography
Module 10: Dark Web and How to Download Sophisticated Stealth Tools
Dark Web and How to Download Sophisticated Stealth Tools
Module 11: Advanced Cloud Security - Azure, AWS, Digital Ocean, Google VM
Advanced Cloud Security - Azure, AWS, Digital Ocean, Google VM
Module 12: H2O Driverless AI, Amazon SageMaker, and Azure Machine Learning AutoML
H2O Driverless AI, Amazon SageMaker, and Azure Machine Learning AutoML
Module 13: Deepfakes and Generating Automated Fake news
Deepfakes and Generating Automated Fake news
Module 14: Advanced Threat Modelling Attacks
Advanced Threat Modelling Attacks
Module 15: Cognitive-Powered Security Intelligence Platform
Cognitive-Powered Security Intelligence Platform
Module 16: Advanced Ransomware and Cryptojacking Attacks
Advanced Ransomware and Cryptojacking Attacks
Module 17: Open Source Intelligence in Cybersecurity
Open Source Intelligence in Cybersecurity
Module 18: Attacking AI Chatbot and Voice Assistants - Siri, Google Home and Alexa
Attacking AI Chatbot and Voice Assistants - Siri, Google Home and Alexa
Module 19: DeepLocker: How AI Can Power a Stealthy New Breed of Malware
DeepLocker: How AI Can Power a Stealthy New Breed of Malware
Module 20: Cybersecurity Insurance
Cybersecurity Insurance
Module 21: Advanced File System Protection With Cyber Deception
Advanced File System Protection With Cyber Deception
Module 22: Legal AI: How Machine Learning Is Aiding, Concerning Law Practitioners
Legal AI: How Machine Learning Is Aiding, Concerning Law Practitioners
Module 23: Advanced Threat Hunting Techniques
Advanced Threat Hunting Techniques
Module 24: Vulnerability Management Process Based on Weaponization and Asset Value
Vulnerability Management Process Based on Weaponization and Asset Value
Module 25: Passwordless Authentication With FIDO
Passwordless Authentication With FIDO
Module 26: Advanced PowerShell Attacks
Advanced PowerShell Attacks
Module 27: Next Generation of the Cyber Range Attacks
Next Generation of the Cyber Range Attacks
Module 28: Advanced Payment Gateway and Financial Cyberattacks
Advanced Payment Gateway and Financial Cyberattacks
Module 29: Developing Immersive Cybersecurity Simulation
Developing Immersive Cybersecurity Simulation
Module 30: Advanced DDOS Attacks Using IoT Botnets
Advanced DDOS Attacks Using IoT Botnets
Module 31: Attacking Hidden Endpoint Management Firewalls and IDS
Attacking Hidden Endpoint Management Firewalls and IDS
Module 32: Advanced BGP Router Attacks
Advanced BGP Router Attacks
Module 33: Machine Learning with Automated Software Vulnerabilities
Machine Learning with Automated Software Vulnerabilities
Module 34: Hacking Medical IoT Devices
Hacking Medical IoT Devices
Module 35: Hacking Biometric Security, and Facial Recognition Systems
Hacking Biometric Security, and Facial Recognition Systems
Module 36: Threat Intelligence Models for Cyber Warfare
Threat Intelligence Models for Cyber Warfare
Module 37: Artificial Intelligence and Cyberwarfare
Artificial Intelligence and Cyberwarfare
Module 38: Hacking Connected Cars
Hacking Connected Cars
Module 39: Hacking Power Grids
Hacking Power Grids
Module 40: Advanced Mobile Phone Hacking, Spying, GPS and Monitoring
Advanced Mobile Phone Hacking, Spying, GPS and Monitoring
Module 41: Home Automation and IoT Gadgets
Home Automation and IoT Gadgets
Module 42: How To Use Tensorflow
Module 42: How To Use Tensorflow
Module 43: Advanced EMP Cyberattacks
Module 43: Advanced EMP Cyberattacks
Module 44: Hacking heart devices and pacemakers
Hacking Heart Devices and Pacemakers
Module 45: Integrating IoT Security Into Vulnerability Management Program
Integrating IoT Security Into Vulnerability Management Program
Module 46: Containers & Cloud Native Security
Containers & Cloud Native Security
RCCE Level 2 Labs
1. Cyber Range - Skytower
2. Cyber Range - Babelfish
3. Cyber Range - Mason Mania
4. Cyber Range - Waterfront
5. Cyber Range - Bullet Edge
6. Cyber Range - Alien Emergency
7. Cyber Range - Strife of Campaigns
8. Cyber Range - Burn of Opportunity
9. Cyber Range - Paradise and Space
10. Cyber Range - Disarray and Predators
11. CyberRange - Blockback
12. Cyber Range - Hellnite
13. Cyber Range - Dreadstar
14. Cyber Range - Altercore
15. Cyber Range - Obsidian Destiny
16. Cyber Range - Global Realm
17. Cyber Range - War of Bravery
18. Cyber Range - Spirits of Blasphemy
19. Cyber Range - Angel and Whispers
20. CyberRange - Sorrow and Tranquility
21. Cyber Range - Dragonrage
22. Cyber Range - Battlemist
23. Cyber Range - Borderspace
24. Cyber Range - Borderstorm
25. Cyber Range - Ethernal Code
26. Cyber Range - Amber Command
27. Cyber Range - Elves of Time
27. Cyber Range - Elves of Time
28. Cyber Range - Conquest of Secrets
29. Cyber Range - King and Society
30. Cyber Range - Wisdom and Infinity
31. Cyber Range - Battleview
32. Cyber Range - Evoblade
33. Cyber Range - Astromind
34. Cyber Range - Castlebot
35. Cyber Range - Amber Wish
36. Cyber Range - Fatal Sun
37. Cyber Range - pirits of Traps
38 . Cyber Range - Crowns of Danger
39. Cyber Range - Creatures and Art
40. Cyber Range - Valor and Monsters
Sorry, but your browser needs to support iframes to see this