Class Details

Course Includes:

  • Class exercises in addition to training instruction 
  • Courseware books, notepads, pens, highlighters and other material 
  • Course retake option
  • Hands on Labs 

This four-day instructor-led training experience covers network intrusion detection completely by covering topics such as, detect evaluation, analysis, situation handling, theories involved in understanding hackers, intelligence gathering, coordinated attacks and preventive and aggressive security measures. This is an ideal course for the serious analyst, this course will put students in full control of their network's security.

For group training options, please call us at (240) 667-7757 or email promo@phoenixts.com.

Download Our Cyber Security Incident Response Plan Template


Course Outline

Module One: Incident Response

Module Two: Forensic Fundamentals

Module Three: Network Evidence Collection

Module Four: Host Based Evidence

Module Five: Understanding Forensic Imaging

Module Six: Network Evidence Analysis

Module Eight: Analyzing System Storage

Module Nine: Forensic Reporting

Module Ten: Malware Anlysis

Module Eleven: Threat Intelligence 


Objectives

Participants will do the following:

 

  • Create and deploy incident response capabilities within your organization
  • Build a solid foundation for acquiring and handling suitable evidence for later analysis
  • Analyze collected evidence and determine the root cause of a security incident
  • Learn to integrate digital forensic techniques and procedures into the overall incident response process
  • Integrate threat intelligence in digital evidence analysis
  • Prepare written documentation for use internally or with external parties such as regulators or law enforcement agencies

Register for Class

Date Location
01/06/20 - 01/09/20, 4 days, 8:30AM – 4:00PM Oklahoma City, OK Sold Out!