Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Forensics & Incident Response

( Duration: 4 Days )

Forensic and Incident Response is a defensive weapon to help us normalize the environment after a negative event has occurred. Hackers and disgruntled employees have increasingly sophisticated tools and backdoor programs at their disposal to steal the intellectual property and expose sensitive information – all with the ability to cover their tracks.

IT professionals charged with protecting the environment can be overwhelmed, causing attacks to be ignored or mistakenly diagnosed as a system or network problem. In Forensic and Incident Response training course, you will learn forensic techniques to identify, respond to, and recover from both an insider and outsider attack.

This comprehensive, technically detailed course enables you to successfully respond to incidents and reinforces the security posture.

By attending Forensic and Incident Response workshop, delegates will learn:

  • Computer forensics process
  • Create evidentiary disk images
  • How to respond to unlawful access and information theft
  • Incident response procedures for Unix and Microsoft Windows systems

  • Experience with the C/C++ for at least one year
  • Comprehensive knowledge of C/C++ and the C/C++ language
  • Basic understanding of web technology is required

This Forensic and Incident Response class is intended for Software developers and software security auditors.

COURSE AGENDA

1

Introduction

  • Principles of Forensics and Incident Response (IR)
2

Preparation

  • Data Collection Techniques
  • Chain of Custody
  • Pre-Incident Preparation
  • Forensic Hardware
  • Basic Incident Response Process
  • Documentation Requirements
3

Legalities

  • Federal Laws – ECPA and USC
  • Interception of Data
  • Stored Communications
  • Unauthorized Access
  • Child Pornography
  • Patriot Act, Gramm-Leach-Bliley Act, and Sarbanes-Oxley
  • Acceptable Use Policies
4

UNIX & Linux Incident Response

  • Live Response Best Practices and Order of Volatility
  • Unix/Linux File Permissions
  • Unix/Linux Live Response
  • Following the Process Tree
5

Windows Incident Response

  • Installed Software and Hotfixes
  • Persistence Mechanisms
  • Window Audit Policies
  • Malware Analysis
  • Alternate Data Streams
  • Windows Registry
6

File Carving and Toolkit Building

  • File Carving
  • Building a Response Kit
  • Determining File Headers
  • Scripting a Response Step by Step
  • Extracting Specific File Types
7

Network-Based Monitoring

  • Sources of Network Data
  • Placement of Monitoring Devices in Network Monitoring Hardware
8

File System Forensics

  • Common File System Types
  • Image File Formats
  • Hard Drive Types
  • Deleted Files
  • File Systems
9

Advanced Topics

  • Memory Analysis and Rootkit Detection
  • Extracting Registry Values from Memory Dumps

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X