The course dives deep into CSIRT/SOC establishment practice, where combination of theory, unique experience with lessons learned, and hands-on practice give attendees a clear and actionable picture on how to build an effective cybersecurity team.
This training helps to successively prepare for cybersecurity team establishment and answers the main questions raised before starting:
The objective of this course is to understand best practices in digital evidence preservation, acquisition, analysis and reporting the through use of various tools and techniques. By the end of this training, participants should be able to: - Understand the best practices in dealing with electronic evidences. - Comprehend hashing and forensic imaging. - Understand the importance of Windows registry in forensic investigation. - Ability to perform forensic imaging. - Ability to perform data recovery/carving. - Skills to analyze forensic images in the forensic analysis tool and reporting.
This course presents a detailed methodological approach to understanding trends in cybercrimes and how cybercrimes can be investigated. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various cybercrime investigation techniques and standard tools necessary to successfully carry-out a mobile forensic investigation. This course will also teach participants how to gather electronic artifacts from mobile devices.
The frequency and complexity of today's cyber attacks makes incident response a critical function for organizations. The management of an incident response team is a very often-neglected topic. Incident response is the last line of defense against cyber attacks for many organisations or even countries. Detecting and efficiently responding to incidents requires strong management processes and driving an incident response team requires special skills and knowledge. A background in information security management or security engineering is not sufficient for managing incidents.
El objetivo del curso es adquirir los conocimientos necesarios para entender el funcionamiento de un Sistema de Gestión de Seguridad de la Información (SGSI) y proponer un diseño de un proyecto de implementación.
The course is designed to empower incident handlers to be effective at their work. The training course presents a comprehensive overview of cybersecurity teams' issues on a technical level, vulnerability handling, trend/technology watch, security tools, and also issues of artefact handling and forensics. The course is technical in nature, relying heavily on hands-on and practical experience. The most recent threats and vulnerabilities are treated.
Ransomware is a major technique that is used by cyber attackers. Victims of Ransomware usually paid their money to attackers for decrypt their valuable files encrypted by Ransomware. This training will enable the participants to understand knowledge of types of Ransomware, encryption, and decryption mechanism of Ransomware. This course also provides hands-on practice with a virtual machine for encryption and decryption techniques used by Ransomware. By the end of this training, participants should be able to have: - Knowledge of Ransomware definition and objective.
Conocer y familiarizarse con los elementos involucrados en el Manejo y respuesta a incidentes de ciberseguridad
Cyber is a buzz word that could be referred to as digital or computer in related to forensic. It is one of the most highly paid professional field in today's technology, is the practice of collecting, analyzing and reporting on computer-related crime with a goal of obtaining evidence that is legally admissible. From educational bodies to high level tech industry, spectrum of available computer forensic tools and skills were highly demanded.