infosec

2022 CYBER INTELLIGENCE COURSES ONLINE AND IN-PERSON

20 PERCENT OFF ONLINE COURSES - 20OFFNOW COUPON UPON CHECKOUT ---- Our In-Person courses cover intelligence, counterintelligence, influence operations, how to build a cyber intelligence program, geopolitical and strategic intelligence,…

INTELLIGENCE AND COUNTERINTELLIGENCE – CYBERSPACE LIFECYCLE AND OPERATIONS

Cutting edge new course from Treadstone 71. The course is a hybridized intelligence and counterintelligence course geared towards executing cyberspace operations through structured methods. Students gain practical hands-on skills in…

Treadstone 71’s CyberIntellipedia

This wiki is an online system for collaborative data sharing built and used by Treadstone 71 to aid in building Cyber Threat Intelligence programs while establishing intelligence sharing and communities…

Cyber Battalion Empowerment Courses in Abali – Iranian Basij Cyber Battalions

Iranian observers review of Basij Cyber Training ranging from cyber personas, denial and deception, hard core hacking, impersonation of groups associated with Reza Pahlavi and associated groups, trolling, and infiltration…

Holy Defense Museum Display of US Gear – UAV

Sardar Haji Zadeh, IRGC Air Force Commander:We are among the top five countries in the world in the field of UAVs. Today, the world's largest drone collection opens at the…

Cybercrime (hiding activities in cyberspace) more #Iranian training

Friday, September 6, 1:50 pm The purpose of the training course During this course you will learn how to use the internet, social networks, etc. for your own purposes (offensive…

Iran’s access to laser cannons

Sensitive Areasiran are protected by laser systems (#indicator) Deputy Minister of Defense Amir Shahrokh Shahram: "It is common in the world that UAVs make their composite layers to be both…

Lab_Dookhtegan Number 19

Implementation of Cyber Threat Security Monitoring System (SATA)

اطلاعاتInformation in transit is secured in communication networks SATA stands for "Threat Information Sharing and Analysis System" The SATA systemaims to analyze and monitor cyber security vulnerabilities, as public and…

The Treadstone 71 Intelligence Roadmap

Treadstone 71’s New Intelligence Professional Training Roadmap Certified Cyber Intelligence Professional Certified Cyber CounterIntelligence Professional The Intelligence Professional Roadmap details the training program covering cyber intelligence and counterintelligence necessary for…

Roozbeh Academy -Rooted in Western Cyber Tools & Training

Another in a long line of Iranian company's and organizations using Western training. Certifying our adversaries in our methods, TTPs, and technology. #SANS #CISSP #ISC2 #ISACA #Splunk #sansuniversity ما را…

Part I – Iranian Site Hack plus months of instruction on how to hack taken from Western sources

Iranians amongst others learn from the West using our tools, techniques, tactics methods in unique ways against us. We continue to provide for this education while suffering the impacts of…

The Lockheed Martin RQ-170 Drone Intercept (along with the #Muddywater hack on the F-35 in Turkey)

Hypo-Hack or actual. Either way, they did it. Iranian UAV theft of the Lockheed Martin RQ-170