Incident Response, Collecting and Analyzing Digital Evidence

Trainings-ID:
CMAP24-Mod6

Inhalt des Trainings

Students will learn the general idea on good practices regarding the evidence gathering. They will be able to perform memory dumps, analyze them and recognize indicators of compromise. Students will also learn how to dump and analyze forensic data from disks, and how to properly extract as well as interpret evidence.

Zielgruppen

  • Ambitious Beginners in Cybersecurity - if you are a beginner with 1-2 years experience in cybersecurity, challenges define who you are. This training will hone your skills to detect today’s sophisticated cyberattacks and accelerate your career prospects in the field.
  • Specialists in IT - if you have 4-5 years experience in IT and want to spin off into cybersecurity, this training will give you all the relevant foundation and specialist skillsets to carve an exciting new career in cybersecurity. 
  • Cybersecurity Specialists - this program is relevant for specialists with 3-5 years and more. You will polish up your skills, learn the most current tools and techniques relevant for the newest systems, and boost your reputation

Detail-Inhalte

  • Evidence Gathering
  • Memory: Dumping and Analysis
  • Memory: Indicators of compromise
  • Disk: dumping & analysis
  • Disk: extracting and interpreting evidence

Bestandteil von

Downloads

Terminanfrage

Ab  0,-*

*Preis pro Teilnehmer*in ohne Zusatzoptionen, exkl. MwSt.

Sie haben Fragen?

Ihr ETC Support

Kontaktieren Sie uns!

+43 1 533 1777-99

Hidden
Hidden
Hidden

Lernformen im Überblick

Mehr darüber