School of Cybersecurity
Rocheston Certified Cybersecurity Engineer (Level 2)
There is no description for this course
Course content
  • Module 1: Sophisticated and Extremely Advanced Phishing Techniques Harvested by Chinese and Russian Hackers
    • Sophisticated and Extremely Advanced Phishing Techniques Harvested by Chinese and Russian Hackers
  • Module 2: Deep Network Insights for Deeper Analytics
  • Module 3: Read Privileged Kernel Memory and Leak Data to Escalate Privileges
  • Module 4: Advanced Blockchain Exploits and Cryptocurrency Mining Attacks
  • Module 5: Sophisticated Government use of Cyberweapon Attacks and How they work
  • Module 6: Principles of Quantum Entanglement to Secure Communication (Unhackable networks)
  • Module 7: Guidance For Cybersecurity Disclosure and Advanced Techniques for Cyber Bounty hunting
  • Module 8: Advanced Mobile Banking and ATM Trojans
  • Module 9: Quantum Computing and Cryptography
  • Module 10: Dark Web and How to Download Sophisticated Stealth Tools
  • Module 11: Advanced Cloud Security - Azure, AWS, Digital Ocean, Google VM
  • Module 12: H2O Driverless AI, Amazon SageMaker, and Azure Machine Learning AutoML
  • Module 13: Deepfakes and Generating Automated Fake news
  • Module 14: Advanced Threat Modelling Attacks
  • Module 15: Cognitive-Powered Security Intelligence Platform
  • Module 16: Advanced Ransomware and Cryptojacking Attacks
  • Module 17: Open Source Intelligence in Cybersecurity
  • Module 18: Attacking AI Chatbot and Voice Assistants - Siri, Google Home and Alexa
  • Module 19: DeepLocker: How AI Can Power a Stealthy New Breed of Malware
  • Module 20: Cybersecurity Insurance
  • Module 21: Advanced File System Protection With Cyber Deception
  • Module 22: Legal AI: How Machine Learning Is Aiding, Concerning Law Practitioners
  • Module 23: Advanced Threat Hunting Techniques
  • Module 24: Vulnerability Management Process Based on Weaponization and Asset Value
  • Module 25: Passwordless Authentication With FIDO
  • Module 26: Advanced PowerShell Attacks
  • Module 27: Next Generation of the Cyber Range Attacks
  • Module 28: Advanced Payment Gateway and Financial Cyberattacks
  • Module 29: Developing Immersive Cybersecurity Simulation
  • Module 30: Advanced DDOS Attacks Using IoT Botnets
  • Module 31: Attacking Hidden Endpoint Management Firewalls and IDS
  • Module 32: Advanced BGP Router Attacks
  • Module 33: Machine Learning with Automated Software Vulnerabilities
  • Module 34: Hacking Medical IoT Devices
  • Module 35: Hacking Biometric Security, and Facial Recognition Systems
  • Module 36: Threat Intelligence Models for Cyber Warfare
  • Module 37: Artificial Intelligence and Cyberwarfare
  • Module 38: Hacking Connected Cars
  • Module 39: Hacking Power Grids
  • Module 40: Advanced Mobile Phone Hacking, Spying, GPS and Monitoring
  • Module 41: Home Automation and IoT Gadgets
  • Module 42: How To Use Tensorflow
  • Module 43: Advanced EMP Cyberattacks
  • Module 44: Hacking heart devices and pacemakers
  • Module 45: Integrating IoT Security Into Vulnerability Management Program
  • Module 46: Containers & Cloud Native Security
  • RCCE Level 2 Labs