Abhishek Kapoor
Abhishek Kapoor
25+ Years Business and Operations experience into IT, Cyber Security & Business Development.
Threat Hunting
Threat Hunting is one of the final activities to pull out the exact traces of an attack that could have happened or was...
If You are a CISO, Adopt CTEM
CTEM (Continuous Threat Exposure Management) is extremely important for a CISO (Chief Information Security Officer) — n...
Sigma Rules in CTEM
Sigma rule creation plays a key role in Continuous Threat Exposure Management (CTEM) by helping organizations detect an...
Continuous Automated Red Teaming in CTEM
CART
CART stands for Continuous Automated Red Teaming.It’s a key component in CTEM (Continuous Threat Exposure...
Continuous Threat Exposure Management – Technology or Framework?
Well. CTEM or Continuous Threat Exposure Management is an evolving framework, not a rigid set of technology! When we se...
Web App Sec Professional | WASP | 2025
The WASP Batch or Web Application Security Professional level training is created with an objective to train, enable & prepare fresh technology and science graduates for entry level premium Cyber Security job and build a strong Cyber Security career thereafter.
<br><br>The training covers networking, security assessment tools, cyber security terminologies, security assessment framework, passive & active info gathering, vulnerability assessment, client side attacks, server side attacks, sql injection, xml attacks & more using pre-recorded videos, live sessions, study material, quiz & lab assignments.
Web App Sec Professional | WASP | Batch 2501
The WASP Batch or Web Application Security Professional level training is created with an objective to train, enable & prepare fresh technology and science graduates for entry level premium Cyber Security job and build a strong Cyber Security career thereafter.
<br><br>The training covers networking, security assessment tools, cyber security terminologies, security assessment framework, passive & active info gathering, vulnerability assessment, client side attacks, server side attacks, sql injection, xml attacks & more using pre-recorded videos, live sessions, study material, quiz & lab assignments.








