Course Outline
Learn how to identify, respond to, and mitigate cyber threats with this in-depth course. Participants will delve into a variety of essential topics, from real incident response tactics and threat hunting to advanced techniques in malware analysis, credential theft prevention, and log analysis. This advanced curriculum is for learners of diverse cybersecurity backgrounds, blending hands-on exercises with theoretical concepts to instill the skill set needed to succeed in the digital forensics field.
Upcoming Meetings
There are no upcoming meetings for this course. Contact us to schedule this course, which will be customized specifically for your organization.
info@hackerupro.comModules
Introduction to Digital Forensics and Incident Response
dentification and Scoping in Incident Response
Containment and Intelligence Development
Eradication, Remediation, and Recovery
Case Study | Credential Theft Prevention, Detection, and Mitigation
Endpoint Detection and Response (EDR)
Advanced Evidence of Execution Detection
Lateral Movement and Log Analysis Techniques
Timeline Analysis and Volume Shadow Copy Examination
Capstone Project and Case Studies
Prerequisites
- Working experience with Windows and Linux operating systems
- Working experience with networking, infrastructure solutions, and cybersecurity principles
- Critical thinking ability for detailed examination of cyber threats and incidents