© All rights reserved. Cyber Struggle 2022
Cyber Struggle Cyber Struggle
  • Company
    • About Us
    • CS Internals
    • CS Manifesto
    • Open Letter for Ranger Grads
    • Careers
    • Press and Media
    • GDPR Notification
    • Contact Us
  • Products
    • S-46 Platform
  • Certifications
    • Ranger Certification
      • Ranger Certification Details
      • Ranger Testimonials
    • Aegis Certification
      • Aegis Certification
      • Aegis Testimonials
    • Contemprorary Certifications
      • Cyber Struggle Tactical Pistol Operator
  • For Corporates
  • Resources
    • Articles
    • Threat Reports
    • Tools
    • Announcements
  • Community
    • Community Programs
      • Ribbon Program
    • Delta Group
0
Cyber Struggle

Multidisciplinary Research

Cyber Struggle
Delta Group

Besides technical researches and studies in cybersecurity, Delta Unit is a community operating multidisciplinary researches within the Cyber Struggle. In addition to cybersecurity, Delta researches about terrorism studies, 4th generation warfares, psychological warfare, unconventional warfare, criminology, and their cyber world implications.

Only CS teammates or graduates can join the Delta Unit.

Delta-Group-1

Delta Application

Four Steps Application

  • Application
    01
    To become Delta, first, the application form should be filled. Please be informed that only grads can apply
  • Hangaround Period
    02
    Candidates should hang around with Delta Members and during this phase, they are given small tasks for certain projects.
  • Prospect Period
    03
    Candidates in this phase become closer to Delta Group and officially should contribute certain projects. They know each other as the trust is important for Delta group.
  • Membership
    04
    After trust and team building, Delta members vote the candidates and successfully voted ones become Delta

Initiate your Delta process

Apply Delta

delta way

Delta Group make their researches in a wide range area

It can be a research in a particular topic or can be in different disciplines to map it into cyber world

Security Studies

Security topics in our kinetic life and its applications in cyber world such as criminology, terrorism, criminal profiling, psychology, etc

Cyber Studies

Cybersecurity related topics such as offensive vectors, incident response, incident management, incident investigation, malware analysis, reverse engineering, fuzzing etc

Intelligence Studies

Intelligence studies in cyber and kinetic world. Spotting, Approaching, Engagement, Strategical, Tactical, Operative intelligence, threat hunting and subdomains of intelligence studies

Where Delta Touches

Conferences

Request a Talk!
  • “Agility for future CSOC”, Cyber Security Talks, Netherlands, 2020
  • “Microsoft ATA Evasion”, BSCon, 2020
  • “Attacking Kerberos in Microsoft Windows”, BSCon, 2020
  • “Windows Remote 0-click Attack Surface”, NopCon, 2019
  • “Future cyber struggle as an unconventional process, uncertainty doctrine and hybrid approach from scalable preparation perspective”, Turkish Asia Strategical Research Center – 2018
  • “Scrum-based multidisciplinary training approach”, Cyber Security Week Holland- 2018
  • “Introduction to hybrid approach to cyber security”, Bilkent University – 2018
  • “Future expertise”, Marmara University – 2018
  • “In OPSEC Fails We Trust, Multidisciplinary Approach in Fighting Cyber Crime”, Yıldırım Beyazıt University BTG Day – 2018
  • “Criminal Profiling and Psychological Warfare in Cyber World”, Academical Informatics – 2017
  • “Do today, what others wont tomorrow”, Isik University Career Days- 2017
Books
  • Learning Metasploit Exploitation and Development
  • Metasploit Penetration Testing Cookbook
  • Mastering Metasploit
  • Mastering Modern Web Penetration Testing
  • Penetration Testing Bootcamp
Academic
Terrorism Database

The objective of terror database is to gather all related and detailed information on terrorist activities onto one platform. Thus, it is aimed to conduct statistical analyses, interpretations and future estimations by the use of this knowledge.

Projects/Tools
Chalumeau

customizable credential dumping tool based on powershell and python

https://github.com/cyberstruggle/chalumeau

Rooster
Falcon
RUSB

I am never out of the fight

Research

Reach out articles, news and blog posts from Delta Group

Delta Blog

Certifications

About
CS Manifesto
Letter to Ranger Grads
Contact Us

About Company

Cyber Struggle Ranger
Cyber Struggle Aegis
Cyber Struggle TPO

For Corporates

Cyber Range Platform
SOC Maturity Certification
In-House SOC Mngmt
Outsource SOC Mngmt
Head Hunting Partnership

Subscribe to newsletter

cs_logo_son

© 2023 Cyber Struggle

in
F.A.Q
Support Forum
Video Tutorials

Search panel can contain any widgets and shortcodes.

Call us: 0 800 255 22 55