Categories
Uncategorized

Hala Elghawi Talks on Phishing and Ransomware attack

Hala Elghawi is one among the speakers of the Rocheston Reinvent Cybersecurity for Women Conference, which will be held on 25th – 27th September, 2020. The topic covered will be Phishing and Ransomware attack Hala has more than 13 years of experience in the banking industry with a passion for Cyber and Technology Risk Management […]

Categories
Uncategorized

Ivy Kashero Talks on Opportunities Available for Women in Cybersecurity and Overcoming Challenges in Building Skill-sets

Ivy Kashero is one among the speakers of the Rocheston Reinvent Cybersecurity for Women Conference, which will be held on 25th – 27th September, 2020. The topic covered will be Opportunities Available for Women in Cybersecurity and Overcoming Challenges in Building Skill-sets. Nominated top 50 Women in Cyber security In Africa 2020 and Martha Ingram […]

Categories
Uncategorized

Lopa Ghosh Talks on Cybersecurity Behaviour and Cyber Culture

Lopa Ghosh is one among the speakers of the Rocheston Reinvent Cybersecurity for Women Conference, which will be held on 25th – 27th September, 2020. The topic covered will be Cybersecurity Behaviour and Cyber Culture. Lopa, is a Cybersecurity Competency Leader at EY, London UK. She comes with close to 2 decades of experience and […]

Categories
Uncategorized

Ruby Kaur Talks on Challenges in Enrolling Women to become Hackers

Ruby Kaur is one among the speakers of the Rocheston Reinvent Cybersecurity for Women Conference, which will be held on 25th – 27th September, 2020. The topic covered will be Challenges in Enrolling Women to become Hackers. Ruby is the Country Manager, Trainocate, Malaysia, an Authorised Training Centre (ATC) for global tech leaders such as […]

Categories
Uncategorized

Confidence Staveley Talks on Digital Hygiene Practices – Catch & Train them young!

Confidence Staveley is one among the speakers of the Rocheston Reinvent Cybersecurity for Women Conference, which will be held on 25th – 27th September, 2020. The topic covered will be Digital Hygiene Practices – Catch & Train them young! Confidence is a cybersecurity awareness evangelist, podcaster, ethical hacker, information technology expert, author and entrepreneur with […]

Categories
Uncategorized

Hemajyothi Valluru Talks on Combating Cyber Security using AI.

Hemajyothi Valluru is one among the speakers of the Rocheston Reinvent Cybersecurity for Women Conference, which will be held on 25th – 27th September, 2020. The topic covered will be Combating Cyber Security using AI. Hemajyothi works as senior cyber security consultant in Dubai with Indian IT major. With 5+ years of experience in Cybersecurity, she […]

Categories
Uncategorized

Microsoft Video Authenticator API Added to Rocheston Rosé OS

RCCE® course update: We are adding Microsoft Video Authenticator API to Rocheston Rosé OS. What is this?Video Authenticator can analyze a still photo or video to provide a percentage chance, or confidence score, that the media is artificially manipulated. In the case of a video, it can provide this percentage in real-time on each frame […]

Categories
Uncategorized

Microsoft Freta added to Rocheston Rosé OS

RCCE® course update: We are adding Microsoft cloud-based malware scanner for Linux called ‘Microsoft Freta’ to Rocheston Rosé OS. What is Microsoft Fretta? Microsoft has unveiled a new threat detection service that can greatly improve security protection on Linux systems. Project Freta is a free cloud-based tool that is able to detect new forms of […]

Categories
Uncategorized

‘Live’ Cyber Threat DDOS Attack Map Dashboard Added to RCCE® course

RCCE® course update: We are adding a ‘live’ cyber threat DDOS attack map dashboards to Rocheston Rosé. You can watch live attack vectors on the big screen now. Download the Rosé 5.7 update. Note: We innovate every week to bring you the best RCCE® classroom experience. Hacking Reinvented. Like. No. Other.

Categories
Uncategorized

Rocheston Rosé (CyberLabs Edition)

RCCE® course update: Meet Rocheston Rosé (CyberLabs Edition). This edition contains hundreds of sophisticated advanced lab exercises running inside Kubernetes clusters. Completely scalable. Hundreds of labs: backups2, apache2, sshlab, packet-introspection, netflow, webtrack supply chain attacks sql-inject, SCADA/ICS quantum attacks, arp-spoof nmap-discovery, MitM. SSL spoofing, cracking encryption, brute forcing passwords, Firewall attacks, IDS attacks, VPN attacks, […]