Course curriculum

    1. Who are we?

    2. Cibersecurity risks

    3. Axur's operations

    1. Axur's diferentials

    2. Axur's Portfolio of solutions

    3. How to make an Axur Platform demo

    1. Brand use in paid search

    2. Fraudulent brand use

    3. Similar domain names

    4. Fake social media profiles

    5. Phishing

    6. Malware

    7. Fake mobile apps

    1. Infostealer credentials

    2. Database exposure

    3. Sensitive data

    4. Corporate credential leak

    5. Code secret leak

    1. Content piracy

    2. Counterfeit products

    1. Threat & Exposure Intelligence (Former Polaris)

    2. Success Case: How Scunna Scaled Its CTI Operation

    3. Deep & Dark Web

About this course

  • Free
  • Exclusive for Partners
  • 2 hours of content