- Security Assessment
- Red Teaming
- Compliance Audit
- Pre-IR Assessment
- Compromise Assessment
- Cyber Education
- GIB Crypto
Learn about attackers’ technology, instruments, and goals, as well as fraud schemes and targeted attacks that involve social engineering and malware.
Learn the basic rules for securing your workspace, and how to protect yourself against malware infection, data leaks, and data encryption.
Learn about cloned sites, pharming, and malware distribution through viruses, and how to detect and prevent device infection and data theft.
Learn how to secure work and personal data that is stored on your mobile phone, as well as the basic safety settings for your browser and how to share data securely.
Learn all you need to know about phishing, including real-life examples and detection methods.
Learn how to set up the safety settings of your social networks and messengers, and how to responsibly post personal information on these platforms.
Learn the safest channels of information exchange at work, including mail services and messengers.
Learn how to properly create, store, and change passwords.
Learn how to secure your devices at home, including smart devices and routers, and adjust your safety settings to protect your home network against attacks. Get insights on how to work safely from home.
Learn about fraudulent giveaways and investment schemes, vishing, spam, pirated resources, and SIM card cloning.
Learn how to act in the event of a cyberattack.
Learn about the specific threats targeting children on the Internet and how to protect your kids in cyberspace.
The rules for how to maintain personal cybersecurity
Methods for protecting both personal and work devices
Understanding of the threat landscape and the methods used by threat actors today
Anastasia conducts digital forensics research regularly participates in conferences, and envelope training courses on digital forensics, incident response, threat hunting, and threat information collection and analysis.
Anastasia has held more than 60 training sessions in five countries and gives lectures on digital forensics and fighting cybercrime at the High School of Economics, Moscow State Institute of International Relations, Moscow Institute of Physics and Technology, and Bauman Moscow State Technical University.
Svetlana conducts research on Android malware analysis, web/mobile application security assessment, smart homes, and other topics.
She has been published in an IEEE journal, has taken part in preparing and making a video course on the basics of information security for school children. Now, Svetalna teaches digital forensics at Innopolis University.
The well-known complete guide to the latest tactics, techniques, and procedures of ransomware operators based on MITRE ATT&CK®