×
Cyber Phoenix

Cyber Security: Threat Analysis and Response Solutions Training

This four-day course addresses the most pressing issues facing cyber-security from both a national and global perspective.

Due to Covid-19 safety restrictions PhoenixTS will temporarily be unable to provide food to our students who attend class at our Training Center; however, our Break Areas are currently open where students will find a constant supply of Coffee, Tea and Water. Students may bring their own lunch and snacks to eat in our breakrooms or at their seat in the classroom or eat out at one of the many nearby restaurants.

Course Overview

Our 3-day, instructor-led Cyber Security: Threat Analysis and Response Solutions Training course covers the following topics:

  • Threat identification
  • Insider threat prevention
  • Detection and mitigation
  • Assessment of security assurance
  • Information terrorism
  • Information security management standards
  • Public policy drivers
  • The role of information security professionals

Before taking this course, you should have some knowledge of threat identification, detection and mitigation, security assurance and network security protocol.

Schedule

Cyber Security: Threat Analysis and Response Solutions Training

date
location
price
1/18/22 - 1/21/22 (3 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
Open
$1,950
1/25/22 - 1/28/22 (3 days)

8:30AM - 4:30PM EST

Online
Open
$1,950
1/25/22 - 1/28/22 (3 days)

8:30AM - 4:30PM EST

Columbia, MD
Open
$1,950
4/12/22 - 4/15/22 (3 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
Open
$1,950
4/19/22 - 4/22/22 (3 days)

8:30AM - 4:30PM EST

Online
Open
$1,950
4/19/22 - 4/22/22 (3 days)

8:30AM - 4:30PM EST

Columbia, MD
Open
$1,950
7/05/22 - 7/08/22 (3 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
Open
$1,950
7/12/22 - 7/15/22 (3 days)

8:30AM - 4:30PM EST

Online
Open
$1,950
7/12/22 - 7/15/22 (3 days)

8:30AM - 4:30PM EST

Columbia, MD
Open
$1,950
10/25/22 - 10/28/22 (3 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
Open
$1,950
11/01/22 - 11/04/22 (3 days)

8:30AM - 4:30PM EST

Online
Open
$1,950
11/01/22 - 11/04/22 (3 days)

8:30AM - 4:30PM EST

Columbia, MD
Open
$1,950
[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

Digital Forensics

  • Defining digital forensics
  • Engaging forensics services
  • Reporting crime
  • Search warrant and law
  • Forensic roles
  • Forensic job market
  • Forensic training

Cybercrime And Defenses

  • Crime in a digital age
  • Exploitation
  • Adversaries
  • Cyber law

Building A Digital Forensics Lab

  • Desktop virtualization
  • Installing Kali Linux
  • Attack virtual machines
  • Cuckoo sandbox
  • Binwalk
  • The sleuth kit
  • Cisco snort
  • Windows tools
  • Physical access controls
  • Storing your forensics evidence
  • Jump bag

Responding To A Breach

  • Why organizations fail at incident response
  • Preparing for a cyber incident
  • Defining incident response
  • Incident response plan
  • Assembling your incident response team
  • Responding to an incident
  • Assessing incident severity
  • Following notification procedures
  • Employing post-incident actions and procedures
  • Identifying software used to assist in responding to a breach

Investigations

  • Pre-investigation
  • Opening a case
  • First responder
  • Device power state
  • Search and seizure
  • Chain of custody
  • Network investigations
  • Forensics reports
  • Closing the case
  • Critiquing the case

Collecting And Preserving Evidence

  • First responder
  • Evidence
  • Hard drives
  • Volatile data
  • Duplication
  • Hashing
  • Data preservation

Endpoint Forensics

  • File systems
  • Windows registry
  • Printer spools
  • Log analysis
  • IoT forensics

Network Forensics

  • Network protocols
  • Security tools
  • Security logs
  • Network baselines
  • Symptoms of threats

Mobile Forensics

  • Mobile devices
  • iOS Architecture
  • iTunes Forensics
  • iOS Snapshots
  • How to jailbreak the iPhone
  • Android
  • Bypass PIN
  • Forensics with commercial tools
  • Call logs and SMS spoofing
  • Voicemail bypass
  • How to find burner phones
  • SIM card cloning

Email And Social Media

  • Message in a bottle
  • Email header
  • Social media
  • People search
  • Google search
  • Facebook search

Cisco Forensics Capabilities

  • Cisco security archietcture
  • Cisco open source
  • Cisco firepower
  • Cisco Advanced Malware Protection (AMP)
  • Cisco threat grid
  • Cisco web security appliance
  • Cisco CTA
  • Meraki
  • Email security appliance
  • Cisco identity services engine
  • Cisco stealthwatch
  • Cisco tetration
  • Cisco umbrella
  • Cisco cloudlock
  • Cisco network technology

Forensics Case Studies

  • Investigating network communication
  • Using endpoint forensics
  • Investigating malware
  • Investigating volatile data
  • Acting as first responder

Forensic Tools

  • Tools
  • Mobile devices
  • Kali Linux tools
  • Cisco tools
  • Forensic software packages
  • Useful websites
  • Miscellaneous sites

Due to Covid-19 safety restrictions PhoenixTS will temporarily be unable to provide food to our students who attend class at our Training Center; however, our Break Areas are currently open where students will find a constant supply of Coffee, Tea and Water. Students may bring their own lunch and snacks to eat in our breakrooms or at their seat in the classroom or eat out at one of the many nearby restaurants.

Subscribe now

Get new class alerts, promotions, and blog posts