Penetration Testing - Cyber Security

Closed
F8th Inc.
Toronto, Ontario, Canada
Preferred learners
  • Anywhere
  • Academic experience
Categories
Security (cybersecurity and IT security) Information technology Software development Machine learning
Skills
offensive security cyber security network security penetration testing artificial intelligence private networks typing
Project scope
What is the main goal for this project?

Description

F8th Inc. provides more protection with less complication. F8th Inc. creates a solution that people actually want to use due to its convenience, simplicity, and absence of friction. By analyzing how people use their mouse, keyboard and touchscreen, the F8th solution collects thousands of data points such as clicking speed, mouse speed, angle of the curve of the mouse, and typing cadence. Then, the artificial intelligence uses this data to create a behavioural biometry that can uniquely identify each user through their session while maintaining their privacy.

What tasks will learners need to complete to achieve the project goal?

Project Scope

This project will follow the famous Red Team, Blue Team and White Team in the Cybersecurity World.

Red Team: Offensive security professionals who are experts in attacking systems and breaking into defenses

Blue Team: Defensive security professionals responsible for maintaining internal network defenses against all cyber attacks and threats

Project Objective

Red teams simulate attacks against blue teams to test the effectiveness of F8th’s network’s security

How will you support learners in completing the project?

Support & Requirements

A team of at least 10-15 people will be required for this project. All members will be added to a channel on zoom where there will be constant communication. Communication can be low touch and project objectives can be discussed once a week.

Please email Kartik Khatri at kartik.khatri@f8th.ai for an introductory meeting.

About the company
  • https://www.f8th.ai/
  • 2 - 10 employees
  • Banking & finance, It & computing, Technology, Business & management

F8th’s mission is to provide solutions to organizations against the latest cyber threats, enforce user privacy and corporate data security, and mitigate the massive damages and losses caused by data breaches.

F8th’s behavioural biometric analysis (BBA) works by analyzing mouse, keyboard and touchscreen movements to discern the unique identity of the user. Unlike conventional two-step authentication systems, F8th uses artificial intelligence, machine learning and deep learning to analyze 100s of these inputs in real time to identify an authorized user vs a fraudster. Moreover, F8th passively protects the customer and corporate data by continuously authenticating users through their human behaviors. Unlike every other tracker, F8th uses data that websites need to provide services, hence it is not impacted by browser tracker blockers, and is completely compliant with the new data privacy regulations.