×
CyberPhoenix

Cyber Security: Threat Analysis and Response Solutions Training

This four-day course addresses the most pressing issues facing cyber-security from both a national and global perspective.

Course Overview

Our 3-day, instructor-led Cyber Security: Threat Analysis and Response Solutions Training course covers the following topics:

  • Threat identification
  • Insider threat prevention
  • Detection and mitigation
  • Assessment of security assurance
  • Information terrorism
  • Information security management standards
  • Public policy drivers
  • The role of information security professionals

Before taking this course, you should have some knowledge of threat identification, detection and mitigation, security assurance and network security protocol.

Schedule

Cyber Security: Threat Analysis and Response Solutions Training

date
location
1/05/21 - 1/07/21 (3 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
Open
1/12/21 - 1/14/21 (3 days)

8:30AM - 4:30PM EST

Online
Open
1/12/21 - 1/14/21 (3 days)

8:30AM - 4:30PM EST

Columbia, MD
Open
3/23/21 - 3/25/21 (3 days)

8:30AM - 4:00PM GMT2

Stuttgart, Germany
Sold Out
4/06/21 - 4/08/21 (3 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
Open
4/13/21 - 4/15/21 (3 days)

8:30AM - 4:30PM EST

Online
Open
4/13/21 - 4/15/21 (3 days)

8:30AM - 4:30PM EST

Columbia, MD
Open
6/29/21 - 7/01/21 (3 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
Open
7/06/21 - 7/08/21 (3 days)

8:30AM - 4:30PM EST

Online
Open
7/06/21 - 7/08/21 (3 days)

8:30AM - 4:30PM EST

Columbia, MD
Open
10/05/21 - 10/07/21 (3 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
Open
10/12/21 - 10/14/21 (3 days)

8:30AM - 4:30PM EST

Online
Open
10/12/21 - 10/14/21 (3 days)

8:30AM - 4:30PM EST

Columbia, MD
Open
[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

Digital Forensics

  • Defining digital forensics
  • Engaging forensics services
  • Reporting crime
  • Search warrant and law
  • Forensic roles
  • Forensic job market
  • Forensic training

Cybercrime And Defenses

  • Crime in a digital age
  • Exploitation
  • Adversaries
  • Cyber law

Building A Digital Forensics Lab

  • Desktop virtualization
  • Installing Kali Linux
  • Attack virtual machines
  • Cuckoo sandbox
  • Binwalk
  • The sleuth kit
  • Cisco snort
  • Windows tools
  • Physical access controls
  • Storing your forensics evidence
  • Jump bag

Responding To A Breach

  • Why organizations fail at incident response
  • Preparing for a cyber incident
  • Defining incident response
  • Incident response plan
  • Assembling your incident response team
  • Responding to an incident
  • Assessing incident severity
  • Following notification procedures
  • Employing post-incident actions and procedures
  • Identifying software used to assist in responding to a breach

Investigations

  • Pre-investigation
  • Opening a case
  • First responder
  • Device power state
  • Search and seizure
  • Chain of custody
  • Network investigations
  • Forensics reports
  • Closing the case
  • Critiquing the case

Collecting And Preserving Evidence

  • First responder
  • Evidence
  • Hard drives
  • Volatile data
  • Duplication
  • Hashing
  • Data preservation

Endpoint Forensics

  • File systems
  • Windows registry
  • Printer spools
  • Log analysis
  • IoT forensics

Network Forensics

  • Network protocols
  • Security tools
  • Security logs
  • Network baselines
  • Symptoms of threats

Mobile Forensics

  • Mobile devices
  • iOS Architecture
  • iTunes Forensics
  • iOS Snapshots
  • How to jailbreak the iPhone
  • Android
  • Bypass PIN
  • Forensics with commercial tools
  • Call logs and SMS spoofing
  • Voicemail bypass
  • How to find burner phones
  • SIM card cloning

Email And Social Media

  • Message in a bottle
  • Email header
  • Social media
  • People search
  • Google search
  • Facebook search

Cisco Forensics Capabilities

  • Cisco security archietcture
  • Cisco open source
  • Cisco firepower
  • Cisco Advanced Malware Protection (AMP)
  • Cisco threat grid
  • Cisco web security appliance
  • Cisco CTA
  • Meraki
  • Email security appliance
  • Cisco identity services engine
  • Cisco stealthwatch
  • Cisco tetration
  • Cisco umbrella
  • Cisco cloudlock
  • Cisco network technology

Forensics Case Studies

  • Investigating network communication
  • Using endpoint forensics
  • Investigating malware
  • Investigating volatile data
  • Acting as first responder

Forensic Tools

  • Tools
  • Mobile devices
  • Kali Linux tools
  • Cisco tools
  • Forensic software packages
  • Useful websites
  • Miscellaneous sites

Starting at $1,950

ATTENTION

Government Employees & Government Contractors call 240.667.7757 for GSA Pricing.

[GSA LOGO]

Get More Information!

Fill out the form below to get more info and pricing for Cyber Security: Threat Analysis and Response Solutions Training!

  • Price Match Guarantee

    We’ll match any competitor’s price quote. Call us at 240-667-7757.

  • This Threat Analysis and Response Solutions Training course includes:

    • 3 days of instructor-led training
    • Cyber Security: Threat Analysis and Response Solutions Training training book
    • Notepad, pen and highlighter
    • Variety of bagels, fruits, doughnuts and cereal available at the start of class*
    • Tea, coffee and soda available throughout the day*
    • Freshly baked cookies every afternoon*
Subscribe now

Get new class alerts, promotions, and blog posts