Incident Response

In this course, students will learn to provide quick and accurate response to vital security incidents, such as entry points to the organization, how many positions were recorded, how to sign the attack, and more.  This course is intended for professionals with backgrounds in operating systems and communications systems.

  • No Experience Necessary
  • Job Placement Assistance
  • Hands On Training

Description

In this course, students will learn to provide quick and accurate response to vital security incidents, such as entry points to the organization, how many positions were recorded, how to sign the attack, and more.  This course is intended for professionals with backgrounds in operating systems and communications systems.

More and more companies are now realizing the detrimental impact of internet crimes on the company’s revenue and reputation, as well as the need for proof-of-protection.

In this course, students will learn to provide quick and accurate response to vital security incidents, such as entry points to the organization, how many positions were recorded, how to sign the attack, and more.  This course is intended for professionals with backgrounds in operating systems and communications systems.

Course Objectives

  • Develop incident response plans
  • Investigate office files, PDF and RTF
  • Analyze emails for forensics purposes
  • Detect, analyze and contain malware and attackers
  • Find anomalies in network traffic

Audience

  • Technically skilled SOC analyst advancing to be part of an incident response team.

Prerequisites

  • Candidates with experience in cyber security field and have technical background with security systems, Windows, Linux and networking.

Duration

  • 40 Hours

Testimonials