Target, Anthem, OPM...just a few of many organizations that have been breached. Most organizations do not have a decent Incident Response plan in place. It is not a matter of if you will be breached, it is a matter of when. Recent studies have shown that the average medical record is worth over $350 on the black market. Stealing information is a lucrative business for cyber criminals.
This course will prepare you for Incident Response, so you can plan and respond appropriately, rather than play a victim of circumstance. The course also introduces you to digital forensics to aid in Incident Response planning and evidence acquisition and analysis. This course's primary objective is to provide an Incident Response framework that can be tailored for your environment.
Tools include: Windows Forensics Toolchest (WFT), Incident Response Collection Report (IRCR2), First Responder’s Evidence Disk (FRED), First Responder Utility (FRU), Md5 Generator, File Recovery, Rootkit Revealer and many others.
This course is for system administrators, incident responders, cyber security professionals and anyone interested in both the technical and non-technical aspects of computer incident response and forensic analysis.
- UNDERSTAND THE TYPE OF RISKS AND BEST PRACTICES FOR PREVENTING THESE RISKS
- LEARN HOW TO MONITOR COMPUTER SYSTEMS FOR EVIDENCE OF MALICIOUS ACTIVITY
- UNDERSTAND THE STEPS INVOLVED IN INCIDENT RESPONSE PROCESS
- LEARN HOW TO ANALYZE DATA GATHERED DURING AN INVESTIGATION
IT Security Fundamentals or equivalent experience.
DURATION AND PRICING
3 days (18 hours)
Contact us to customize an offering that fits your budget and specific requirements. We can deliver instructor-led training at your site, our education center, or virtually — whenever and wherever!
- DATA COLLECTION
- DATA ANALYSIS