Class Details

Course Includes:

  • Class exercises in addition to training instruction 
  • Courseware books, notepads, pens, highlighters and other material 
  • Course retake option
  • Hands on Labs 

This four-day instructor-led training experience covers network intrusion detection completely by covering topics such as, detect evaluation, analysis, situation handling, theories involved in understanding hackers, intelligence gathering, coordinated attacks and preventive and aggressive security measures. This is an ideal course for the serious analyst, this course will put students in full control of their network's security.

For group training options, please call us at (240) 667-7757 or email promo@phoenixts.com.

Download Our Cyber Security Incident Response Plan Template


Course Outline

Module 1: Real-World Incidents

Module 2: IR Management Handbook

Module 3: Pre-Incident Preparation

Module 4: Getting the Investigation Started on the Right Foot

Module 5: Initial Development of Leads

Module 6: Discovering the Scope of the Incident

Module 7: Live Data Collection

Module 8: Forensic Duplication

Module 9: Network Evidence

Module 10: Enterprise Services

Module 11: Analysis Methodology

Module 12: Investigating Windows Systems

Module 13: Investigating Mac OSX Systems

Module 14: Investigating Applications

Module 15: Malware Triage

Module 16: Report Writing

Module 17: Remediation Introduction


Objectives

Participants will do the following:

  • Architect an infrastructure that allows for methodical investigation and remediation
  • Develop leads, identify indicators of compromise, and determine incident scope
  • Collect and preserve live data
  • Perform forensic duplication
  • Analyze data from networks, enterprise services, and applications
  • Investigate Windows and Mac OS X systems
  • Perform malware triage
  • Write detailed incident response reports
  • Create and implement comprehensive remediation plans