Training

Entries with this tag cover offensive-security certifications, tasks involved in earning them, ethical-hacking challenges and other training activities.

Photo by Oleksii Khodakivskiy on Unsplash

Andres Roldan


A Certified Red Team Lead (CRTL) Review

In this post we review the RTO-2 course and CRTL certification offered by Zero-Point Security.

Photo by Andrew Neel on Unsplash

Felipe Ruiz


Top 10 international capture the flag competitions

Do you know what capture the flag is in the cybersecurity field? Are you aware of some of the most recent and prominent CTF competitions worldwide? Learn here.

Photo by Alex Kotliarskyi on Unsplash

Jason Chavarría


Top 10 offensive security international conferences

Want to know which are the best conferences for hackers? We share our selection of the top 10 international hacking events focusing on offensive security.

Photo by Mathew Schwartz on Unsplash

Jason Chavarría


Enhancing cybersecurity across government entities

Learn about the Federal Rotational Cyber Workforce Program Act of 2021 and the State and Local Government Cybersecurity Act of 2021, which were signed into law.

Photo by Jeff Lemond on Unsplash

Jason Chavarría


Learn with Fluid Attacks about this professional path

Ever wondered what a DevSecOps engineer does in the cybersecurity industry? Find out their job functions and the required skills and experience to become one.

Photo by Mulyadi on Unsplash

Jason Chavarría


Do you have an incident response plan already?

Organizations need to realize that they are always at risk of suffering cyberattacks and it is of utmost importance that they have a plan for when that happens.

Photo by Clark Van Der Beken on Unsplash

Jason Chavarría


Clues in the investigation of cyberattacks

We describe the kinds of technical traces left in the phases of a cyberattack and talk about how they may help the attribution process.

Photo by Andre Mouton on Unsplash

Jason Chavarría


Employees as the strongest link in the security chain

The human-as-a-security-sensor paradigm asserts that catastrophe can be prevented if employees are trained to report threat events promptly. Learn more here.

Photo by Marco Bianchetti on Unsplash

Jason Chavarría


Discover social engineers' weapons of influence

Read this post to learn the psychological tactics used in cyberattacks and what personality traits make targets more (or less) susceptible to fall for them.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.