PwC's Dark Lab in Hong Kong is an advanced cybersecurity professional services team of over 250 people that provides organizations with cyber threat operations services – ranging from red teaming to security monitoring to incident response and threat intelligence. The team are in the front-lines of Hong Kong and Asia market and are looking to identify passionate talents that want to join us in protecting Hong Kong society from cyber threats. Attend our courses to understand our day-to-day operations and gain hands-on experience to uplift your technical skills and verify if you want to join us to be a DarkLabber!
This comprehensive instructor-led course is designed to equip participants with the practical skills and knowledge necessary to conduct effective and comprehensive penetration testing engagements. It covers essential concepts such as reconnaissance, vulnerability identification, exploitation, post-exploitation, and reporting. Through a combination of hands-on labs and theoretical instruction, students will develop proficiency in utilizing various tools, techniques, and methodologies employed by professional Red Teamers. Upon successful completion, participants will have a better proficiency in penetration testing fundamentals in alignment with CREST syllabus for CREST Registered Penetration Tester (CRT) and other industry certifications in offensive security.
This comprehensive instructor-led course provides a solid foundation in understanding and applying intelligence-driven approaches to cybersecurity. It covers CTI fundamentals, intelligence lifecycle, collection techniques, analysis methodologies, threat hunting, legal considerations, and industry best practices. Participants gain a combination of theoretical and practical skills using various open source tools and platforms, and validate it through practical exercises and theoretical assessments. Upon completion, students will understand CTI principles, collect and analyze intelligence, apply proactive threat detection, and have a better proficiency in CTI fundamentals in alignment with CREST syllabus for CREST Practitioner Threat Intelligence Analyst (CPTIA) and CREST Registered Threat Intelligence Analyst (CRTIA).
This comprehensive instructor-led course provides a solid foundation in understanding and applying intelligence-driven approaches to cybersecurity. It covers CTI fundamentals, intelligence lifecycle, collection techniques, analysis methodologies, threat hunting, legal considerations, and industry best practices. Participants gain a combination of theoretical and practical skills using various open source tools and platforms, and validate it through practical exercises and theoretical assessments. Upon completion, students will understand CTI principles, collect and analyze intelligence, apply proactive threat detection, and have a better proficiency in CTI fundamentals in alignment with CREST syllabus for CREST Practitioner Threat Intelligence Analyst (CPTIA) and CREST Registered Threat Intelligence Analyst (CRTIA).
Delivery method:
Instructor-led
Locations:
Hong Kong
Contact:
Jason Lee
Contact Training Provider, PwC's Dark Lab in Hong Kong
Fill out your details and a member of our team will contact you shortly. "*" indicates required fields
"*" indicates required fields
PwCs Dark Lab in Hong KongPwC's Dark Lab in Hong Kong
Arrange a PwC's Dark Lab in Hong Kong Call Back
Fill out your details and a member of our team will contact you shortly. "*" indicates required fields
"*" indicates required fields
PwC's Dark Lab in Hong Kong Contact Details
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.