Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

Computer Forensics Investigation and Incident Response

This course will give you a firm understanding of advanced incident response and computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, advanced persistent threats, and complex digital forensic cases.

Utilizing advances in spear phishing, web application attacks, and persistent malware these new sophisticated attackers advance rapidly through your network. Incident Responders and Digital Forensic investigators must master a variety of operating systems, investigation techniques, incident response tactics, and even legal issues in order to solve challenging intrusion cases. This course will teach you critical forensic analysis techniques and tools in a hands-on setting for both Windows- and Linux-based investigations.

Attackers will use anti-forensic techniques to hide their tracks. They use rootkits, file wiping, timestamp adjustments, privacy cleaners, and complex malware to hide in plain sight avoiding detection by standard host-based security measures. Everything leaves will leave a trace; you merely need to know where to look.

Learning more than just how to use a forensic tool, by taking this course you will be able to demonstrate how the tool functions at a low level. You will become skilled with new tools, such as the Sleuthkit, Foremost, and the HELIX3 Pro Forensics Live CD. SANS hands-on technical course arms you with a deep understanding of the forensic methodology, tools, and techniques to solve advanced computer forensics cases.
Rating
541
1 vote
Favoured:
0

Listing Details

Vendor
SANS
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2010-12-16
Owner
michelemjordan
Add'l Info
Location - Worldwide Duration - 6 days
Created
2009-02-19
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
    • - Ethical Hacking
    • - CISSP Training
    • - Virus Training
    • - Intro to Security
    • - Intrusion Detection
    • - Firewalls and VPNs
    • - Unix and Linux Training
    • - Windows Security
    • - Forensics Training
    • - Incident Response
    • - Database Security
    • - Web Server Security
    • - Wireless Security
    • - Programming Security
    • - Network Security
    • - UK University Programs +
    • - US University Programs +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message