This 5 day training course examines the fundamentals of system forensics: what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. Students will learn about the tools, techniques, and methods used to perform computer forensics and investigation. This course explores emerging technologies as well as future directions of this interesting and cutting-edge field.
In this 5 day course you will learn:
Identify the best defensive measures to effectively protect a network
Setup and maintain an intrusion detection system
Conceptualize and develop intrusion detection rules and rule sets
Analyze and respond to intrusion attempts
Recover from a successful intrusion
Network defenders who want to respond to networking threats
Incident responders needing to quickly address system security breaches
Individuals who need a firm understanding of signature development and Snort
Before taking this course, students should have the following skills and experience:
A firm understanding of TCP/IP
Network+ or equivalent knowledge or background
Both the Network Traffic Analysis course and the Malicious Network Traffic Analysis course are recommended prior to attending.
*Course Cost listed does not include the cost of courseware or exam. Course is subject to a minimum enrollment to run. Course may run virtually as a Virtual Instructor-Led (VILT) class if the minimum enrollment is not met. If the course is under the minimum enrollment the course may run as 4 day class (Bootcamp Style). For more information, please contact email@example.com or call 207-775-0244.