SNHT.SE (@snhtse) 's Twitter Profile
SNHT.SE

@snhtse

ID: 1538103184144621568

calendar_today18-06-2022 10:16:43

8 Tweet

8 Takipçi

1 Takip Edilen

SNHT.SE (@snhtse) 's Twitter Profile Photo

We welcome all of the participants of Swedish National Hacking Team Bootcamp starting already today 19th of June. During the Bootcamp we'll cover cybersecurity domains such as web, exploit, crypto, reverse engineering, and forensics! #cybersecurity #snht

We welcome all of the participants of Swedish National Hacking Team Bootcamp starting already today 19th of June. During the Bootcamp we'll cover cybersecurity domains such as web, exploit, crypto, reverse engineering, and forensics! #cybersecurity #snht
SNHT.SE (@snhtse) 's Twitter Profile Photo

We are happy to collaborate with ACNR Cyber Technology, KTH Royal Institute of Technology, Saab, sebbank, Combitech, Cparta Cyber Security, Försvarsmakten, FRA, NCSC Sweden, Revived User, RISE to educate a new generation of cyber security experts in Sweden. #CyberSecurity

SNHT.SE (@snhtse) 's Twitter Profile Photo

We've kicked off our first day yesterday with going through common website security vulnerabilities and APIs between applications and servers. Now that all the participants should be able to recognise and secure them while we're preparing for the second subject.#CyberSecurity

SNHT.SE (@snhtse) 's Twitter Profile Photo

Day 2. Today we're discussing reverse engineering in order to understand how a device, system or software accomplishes different tasks. Understanding how something really works on a fundamental level can expose common mistakes and weaknesses.#CyberSecurity #snht #snhtbootcamp

SNHT.SE (@snhtse) 's Twitter Profile Photo

Day 3. After going through the reverse engineering fundamentals we will search for vulnerabilities and study how they can be exploited. The same knowledge can in real life be used to help companies detect vulnerabilities and secure their system (aka bug bounty) #CyberSecurity

Day 3. After going through the reverse engineering fundamentals we will search for vulnerabilities and study how they can be exploited. The same knowledge can in real life be used to help companies detect vulnerabilities and secure their system (aka bug bounty) #CyberSecurity
SNHT.SE (@snhtse) 's Twitter Profile Photo

Day 4. Cryptography is on today's schedule! SNTH team will learns about different cryptographic systems and how to decrypt the information that was supposed to be protected. #CyberSecurity #snht #snhtbootcamp

SNHT.SE (@snhtse) 's Twitter Profile Photo

Last day of the SNHT - we're going through forencics and investigate suspisious activities occuring on the Internet. Everyone will learn how to find traces from an intrusion to figure out what has occurred. #CyberSecurity #snht #snhtbootcamp

Last day of the SNHT - we're going through forencics and investigate suspisious activities occuring on the Internet. Everyone will learn how to find traces from an intrusion to figure out what has occurred. #CyberSecurity #snht #snhtbootcamp