| Related Products
 | ||||||
| About
            Altered Security offers a hands-on cybersecurity education platform featuring Red Team labs, cyber ranges, bootcamps, and certifications designed for Active Directory, Azure, and enterprise security. Through self-paced on-demand labs and in-person sessions, participants gain access to realistic, fully patched environments along with preconfigured VMs, detailed video courses (11–14+ hours), lab manuals, walk-through videos, and instructor support. Courses such as Certified Red Team Professional (CRTP), Certified Red Team Expert (CRTE), and AD CS Attacks cover topics including enumeration, privilege escalation, Kerberos, certificate-based attacks, lateral movement, hybrid Azure-PHF, and cloud persistence. Labs simulate enterprise networks with multiple domains and forests, guiding learners from non‑admin starts to enterprise admin compromise, and include exam attempts for industry-recognized certifications.
             | About
            An API based cloud security posture management and compliance assurance platform that offers enterprises complete cloud control through actionable cloud security intelligence across cloud infrastructure. Take complete control of your cloud using our intelligent security automation. Total compliance assurance for security standards and regulations using our out-of-the-box-policies. Manage identity privilege across your cloud and avoid compromised credentials and insider threats. Gain enhanced visibility into your cloud to strengthen your cloud defense. C3M strives to create a secure and compliant cloud ecosystem. This mission cannot be achieved unless we share our product road map with our customers and partners, and gain constant inputs on what you want to see in a comprehensive cloud security solution. Help us reinvent ourselves.
             | |||||
| Platforms Supported
            
                Windows
            
            
         
            
                Mac
            
            
         
            
                Linux
            
            
         
            
                Cloud
            
            
         
            
                On-Premises
            
            
         
            
                iPhone
            
            
         
            
                iPad
            
            
         
            
                Android
            
            
         
            
                Chromebook
            
            
         | Platforms Supported
            
                Windows
            
            
         
            
                Mac
            
            
         
            
                Linux
            
            
         
            
                Cloud
            
            
         
            
                On-Premises
            
            
         
            
                iPhone
            
            
         
            
                iPad
            
            
         
            
                Android
            
            
         
            
                Chromebook
            
            
         | |||||
| Audience
        Security professionals and IT staff wanting a solution to build or advance hands‑on skills in enterprise and certificate‑based attack/defense techniques
         | Audience
        Companies of all sizes
         | |||||
| Support
            
                Phone Support
            
            
         
            
                24/7 Live Support
            
            
         
            
                Online
            
            
         | Support
            
                Phone Support
            
            
         
            
                24/7 Live Support
            
            
         
            
                Online
            
            
         | |||||
| API
            
                Offers API
            
            
         | API
            
                Offers API
            
            
         | |||||
| Screenshots and Videos | Screenshots and Videos | |||||
| Pricing
        No information available.
        
        
     
            
                Free Version
            
            
         
            
                Free Trial
            
            
         | Pricing
        No information available.
        
        
     
            
                Free Version
            
            
         
            
                Free Trial
            
            
         | |||||
| 
Reviews/ | 
Reviews/ | |||||
| Training
            
                Documentation
            
            
         
            
                Webinars
            
            
         
            
                Live Online
            
            
         
            
                In Person
            
            
         | Training
            
                Documentation
            
            
         
            
                Webinars
            
            
         
            
                Live Online
            
            
         
            
                In Person
            
            
         | |||||
| Company InformationAltered Security Founded: 2018 Singapore www.alteredsecurity.com | Company InformationC3M Founded: 2018 United States c3m.io | |||||
| Alternatives | Alternatives | |||||
|  | ||||||
|  | ||||||
|  | ||||||
| Categories | Categories | |||||
| Cloud Security Features
            
                Antivirus
            
            
         
            
                Application Security
            
            
         
            
                Behavioral Analytics
            
            
         
            
                Encryption
            
            
         
            
                Endpoint Management
            
            
         
            
                Incident Management
            
            
         
            
                Intrusion Detection System
            
            
         
            
                Threat Intelligence
            
            
         
            
                Two-Factor Authentication
            
            
         
            
                Vulnerability Management
            
            
         Compliance Features
            
                Archiving & Retention
            
            
         
            
                Artificial Intelligence (AI)
            
            
         
            
                Audit Management
            
            
         
            
                Compliance Tracking
            
            
         
            
                Controls Testing
            
            
         
            
                Environmental Compliance
            
            
         
            
                FDA Compliance
            
            
         
            
                HIPAA Compliance
            
            
         
            
                Incident Management
            
            
         
            
                ISO Compliance
            
            
         
            
                OSHA Compliance
            
            
         
            
                Risk Management
            
            
         
            
                Sarbanes-Oxley Compliance
            
            
         
            
                Surveys & Feedback
            
            
         
            
                Version Control
            
            
         
            
                Workflow / Process Automation
            
            
         | ||||||
| Integrations
            
                
    Active Directory
            
            
         
            
                
    Microsoft Azure
            
            
         | ||||||
|  |  | 
