Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

OpenText EnCase - Endpoint Security

( Duration: 4 Days )

The OpenText EnCase - Endpoint Security training course is designed to instruct computer investigation and information security professionals' incident analysis and response, data risk mitigation, and data policy compliance techniques, using the EnCase Endpoint Security.

By attending OpenText EnCase - Endpoint Security workshop, delegates will learn:

  • Cybersecurity issues currently facing corporations and organizations
  • The capabilities provided with EnCase Endpoint Security
  • Setting up and configuring EnCase Endpoint Security to begin investigations
  • Creating investigations using the EnCase Endpoint Security web interface
  • Navigating through an investigation
  • Preparing detections for escalation to the next level of investigation
  • Using the Memory Acquisition module
  • Using preconfigured policy rules to detect malicious or suspicious activity
  • Creating and importing white and black lists
  • Using conditions to focus searches
  • Creating snapshots and using snapshot technology
  • Creating a job to acquire RAM
  • Conducting searches of the Windows Registry
  • Conducting a timeline analysis using the real-time monitoring tools included with EnCase Endpoint Security
  • Searching indicators of compromise (IOC)
  • Finding Items of Interest (IoI)
  • Collecting and reviewing data
  • Remediation techniques

  • Good understanding of using EnCase Endpoint Investigator for incident response investigations.
  • Knowledge of computer networking hardware, protocols, and concepts is helpful.
The OpenText EnCase - Endpoint Security class is ideal for:
  • Law Enforcement Officers, Computer Forensic Examiners, Corporate & Private Investigators & Network Security Personnel.

COURSE AGENDA

1

Day 1

  • How EnCase Endpoint Security benefits corporations and government agencies.
  • Current cybersecurity trends and how EnCase Endpoint Security works within a security infrastructure.
  • The planning and methodology necessary for network-enabled incident response.
  • EnCase Endpoint Security terminology, infrastructure and definitions of included program components and how to create an investigation using the EnCase Endpoint Security web interface and desktop client.
2

Day 2

  • Navigate the EnCase Endpoint Security investigation interfaces-web and desktop client.
  • Prepare data for escalation to Tier 2 and Tier 3 investigators.
  • Use preconfigured and customized rules to detect malicious or suspicious activity.
  • Import whitelists and blacklists into EnCase Endpoint Security for use with current and future investigations.
  • Add items of interest to the whitelists and blacklists.
3

Day 3

  • Examine and acquire data in RAM.
  • Use the Registry Search module of EnCase Endpoint Security.
  • Create custom conditions that are not part of the pre-packaged conditions, keywords or matching files conditions.
4

Day 4

  • Use the tools included with EnCase Endpoint Security to identify changes to files, processes and ports over a set amount of time.
  • Conduct a search to find specific items of interest (IOI) and build a case from the responses.
  • Determine an indicator of compromise and create custom IOC rules and an IOC search.
  • Compare snapshots with EnCase Endpoint Security and determine what can be accomplished by comparing snapshots at different points in time.
  • Create custom data collection rules and collect data from different targets.
  • Remediate known malware and registry keys.

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X