Countering hacker attacks: protection, prediction, recognition, response - course RUB 129,990. from Specialist, training, Date: November 20, 2023.
Miscellaneous / / November 29, 2023
Leading teacher of the center for Microsoft Azure and network technologies Microsoft, has statuses MS: MCSA, MCSE, MCDBA and SCNP.
Microsoft Certified Trainer (MCT) with over 20 years of teaching experience. During his time as a teacher, he trained more than 4,000 specialists.
Alexander Vitalievich Candidate of Sciences, majoring in Cybernetics, author of professional articles on systems for processing, transmitting and protecting information, and automated control systems. Has more than 30 technical certifications (Microsoft, CompTIA, SCP, ITIL) and extensive experience in managing technical support for corporate customers.
Alexander Vitalievich worked for more than 14 years in the technical support service of Microsoft Corporation, of which more than 10 years led the group technical support for corporate customers, managing a team of more than 20 technical support managers and providing premium Premier support of more than 100 largest Russian corporations, including Magnit, Lenta, Russian Post, Kaspersky and etc. Alexander Vitalievich took an active part in the introduction of a new type of premium technical support (Microsoft Unified Support) in Russia in 2018-2020, focused on maximizing assistance in the implementation of cloud technologies in organizations.
During the classes, the teacher places the main emphasis on developing practical skills in students. In their reviews, graduates invariably note not only the information richness and structure of the material, but also the especially warm, friendly atmosphere, humor, and abundance of cases and stories from practice.
A unique professional in terms of qualifications and experience, a leading teacher in the field of Computer Network Security.
He was the first in Russia to receive the status of an authorized instructor in ethical hacking. He is a member of the “Circle of Excellence” of ethical hacking instructors and has the status of Licensed Penetration Tester (Master). In his classes there is an atmosphere of a real celebration of knowledge, experience and skill. Listeners are delighted - read the reviews and see for yourself!
Holder of 50 prestigious international certifications, including 30 certifications in information security and ethical hacking. Master of Ethical Hacking and Penetration Testing (Licensed Penetration Tester Master). Offensive Security Certified Professional (OSCP) and Security Certified Program (SCP). Microsoft Certified Security Engineer (MCSE: Security) and certified instructor for EC-Council, Microsoft and CryptoPro.
Under the leadership of Sergei Klevogin, the team of the Specialist Center reached the finals of the World CyberOlympic Games 2015, where they won the Olympic award of Champions of the Region!
Regularly participates and conducts master classes at international conferences and forums on information security - Black Hat, Hacker Halted, OWASP AppSec, Positive Hack Days. Author and presenter of free seminars on hacking techniques and penetration testing.
Sergey Pavlovich has experience as a programmer in the Ministry of Defense of the Russian Federation, an information security inspector in the Central Bank of the Russian Federation, head of the Information Technology Department in a commercial bank, teacher at the Moscow Economic and Statistical Institute Institute. Sergei Pavlovich’s experience is very valuable in that it demonstrates both professional mastery of IT products and principles, and an understanding of the integration of business processes with information technology. And most importantly, Sergey Pavlovich shares his experience and can talk about complex technologies simply and clearly.
During his classes, Sergei Pavlovich combines an explanation of theoretical material with a demonstration of setting up various components of the system. The material is supplemented with details that often go beyond the scope of the course (a joke, an unexpected entertaining question, a funny computer trick).
You can find examples at the link: Hacking video.
There is no case in which a spy would not be useful. You will learn to evaluate information from the point of view of the laws of logic, identify logical errors, connections between phenomena, see inconsistencies and beautifully expose liars.
2,9
The course is for those who have encountered the area of Critical Information Infrastructure (CII) in their work. The course involves studying regulatory documents on CII, discussing actions at all stages of work on categorization and protection of CII objects, analysis of practical options for solving the main problem moments.
4,1