Social Network For Security Executives: Help Make Right Cyber Security Decisions
Workshop Duration: 2 days
Date: 4 & 5th June,2015
Price: INR 25,000
Digital forensics and incident response are two of the most critical fields in all of information security.The staggering number of reported breaches in the last year has shown that the ability to rapidly respond to attacks is a vital capability for all organizations. Unfortunately, the standard IT staff member is simply unable to effectively respond to security incidents. Successful handling of these situations requires specific training in a number of very technical areas including filesystem implementation, operating system design, and knowledge of possible network and host attack vectors. During this training, students will learn both the theory around digital forensics and incident response as well as gain valuable hands-on experience with the same types of evidence and situations they will see in real-world investigations. The class is structured so that a specific analysis technique is discussed and then the students immediately analyze staged evidence using their newly gained knowledge. Not only does this approach reinforce the material learned, but it also gives the investigator a number of new skills as the course proceeds. Upon completion of the training, students will be able to effectively preserve and analyze a large number of digital evidence sources, including both on-disk and in-memory data. These skills will be immediately usable in a number of investigative scenarios, and will greatly enhance even experienced investigators' skillset. Students will also leave with media that contains all the tools and resources used throughout the training.
You need to bring:
A DVD with:
CISSP, Cyber security analyst & Cyber conflict researcher with 13+ yrs of experience in information security. Expect some end to end, practical hands-on forensic problem solving!
Checkout other training
>> Network Forensics & Practical Packet Analysis: Click Here
>> Application Security Testing & Web Hacking: Click Here
>>Reverse Engineering & Malware Analysis: Click Here
>>Advanced Android & iOS Hands-on Exploitation - Click here
>>Security Testing In The Cloud: Click Here
>> Decision Summit & Top 100 CISO Awards: Click Here