×
Cyber Phoenix

Incident Response Training

This training covers essential skills for cybersecurity professionals responsible for network intrusion detection and incident response.

 

 

Due to Covid-19 safety restrictions PhoenixTS will temporarily be unable to provide food to our students who attend class at our Training Center; however, our Break Areas are currently open where students will find a constant supply of Coffee, Tea and Water. Students may bring their own lunch and snacks to eat in our breakrooms or at their seat in the classroom or eat out at one of the many nearby restaurants.

Course Overview

This 4-day instructor-led training experience covers network intrusion detection completely by covering topics such as, detect evaluation, analysis, situation handling, theories involved in understanding hackers, intelligence gathering, coordinated attacks and preventive and aggressive security measures. This is an ideal course for the serious analyst, this course will put students in full control of their network’s security.

Schedule

Incident Response Training

date
location
price
9/06/22 - 9/09/22 (4 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
Open
$1,950
9/13/22 - 9/16/22 (4 days)

8:30AM - 4:30PM EST

Online
Open
$1,950
9/13/22 - 9/16/22 (4 days)

8:30AM - 4:30PM EST

Columbia, MD
Open
$1,950
12/06/22 - 12/09/22 (4 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
Open
$1,950
12/13/22 - 12/16/22 (4 days)

8:30AM - 4:30PM EST

Online
Open
$1,950
12/13/22 - 12/16/22 (4 days)

8:30AM - 4:30PM EST

Columbia, MD
Open
$1,950
2/06/23 - 2/09/23 (4 days)

8:30AM - 4:30PM

Tysons Corner, VA
Open
$1,950
2/13/23 - 2/16/23 (4 days)

8:30AM - 4:30PM

Columbia, MD
Open
$1,950
2/13/23 - 2/16/23 (4 days)

8:30AM - 4:30PM

Online
Open
$1,950
5/09/23 - 5/12/23 (4 days)

8:30AM - 4:30PM

Tysons Corner, VA
Open
$1,950
5/15/23 - 5/18/23 (4 days)

8:30AM - 4:30PM

Columbia, MD
Open
$1,950
5/15/23 - 5/18/23 (4 days)

8:30AM - 4:30PM

Online
Open
$1,950
8/07/23 - 8/10/23 (4 days)

8:30AM - 4:30PM

Tysons Corner, VA
Open
$1,950
8/14/23 - 8/17/23 (4 days)

8:30AM - 4:30PM

Columbia, MD
Open
$1,950
8/14/23 - 8/17/23 (4 days)

8:30AM - 4:30PM

Online
Open
$1,950
10/10/23 - 10/13/23 (4 days)

8:30AM - 4:30PM

Tysons Corner, VA
Open
$1,950
10/16/23 - 10/19/23 (4 days)

8:30AM - 4:30PM

Columbia, MD
Open
$1,950
10/16/23 - 10/19/23 (4 days)

8:30AM - 4:30PM

Online
Open
$1,950
[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Objectives

By the end of this course students will be able to do the following:

  • Create and Deploy incident capabilities within your organization
  • Build a solid foundation for acquiring and handling suitable evidence for later analysis
  • Analyze collected evidence and determine the root cause of a security incident
  • Learn to integrate digital forensic techniques and procedures into the overall incident response process
  • Integrate threat intelligence in digital evidence analysis
  • Prepare written documentation to use internally or with external parties such as regulators or law enforcement agencies.

Course Outline

Incident Response

  • Incident response process
  • Incident response framework
  • Incident response plan
  • Incident response playbook

Forensic Fundamentals

  • Legal aspects
  • Digital forensic fundamentals

Network Evidence Collection

  • Preparation
  • Network device evidence
  • Packet capture
  • Evidence collection

Host-Based Evidence

  • Evidence volatility
  • Evidence acquisition
  • Evidence collection procedures
  • Non-volatile data

Understanding Forensic Imaging

  • Overview of forensic imaging
  • Preparing a stage drive
  • Imaging

Network Evidence Analysis

  • Analyzing packet captures
  • Analyzing network log files

Analyzing System Memory

  • Memory evidence overview
  • Memory analysis

Analyzing System Storage

  • Forensic platforms

Forensic Reporting

  • Documentation overview
  • Incident tracking
  • Written reports

Malware Analysis

  • Malware overview
  • Malware analysis overview
  • Analyzing malware
  • Dynamic analysis

Threat Intelligence

  • Threat intelligence overview
  • Threat intelligence methodology
  • Threat intelligence direction
  • Threat intelligence sources
  • Threat intelligence platforms
  • Using threat intelligence

FAQs

Who should take this course?

This course is intended for System and Network Analysts, System Administrators, Network Administrators, and management level IT professionals.

What is the recommended experience for this course?

Students should have knowledge of system and network common security threats, analysis techniques, and data recovery.

Due to Covid-19 safety restrictions PhoenixTS will temporarily be unable to provide food to our students who attend class at our Training Center; however, our Break Areas are currently open where students will find a constant supply of Coffee, Tea and Water. Students may bring their own lunch and snacks to eat in our breakrooms or at their seat in the classroom or eat out at one of the many nearby restaurants.

Subscribe now

Get new class alerts, promotions, and blog posts