Objectives of the training
At the end of the training, the participant will be able to detect and manage incidents in their entirety.Targeted audience
Computer crime investigator, cybersecurity consultant, computer forensic analyst, cryto-analyst;, digital crime specialist, intelligence technology analyst, malware specialistPrerequisite
NoneTrainers
Course architecture
- Introduction to incident handling and response.
- Incident handling and response process.
- Forensic preparedness and first response.
- Malware incident handling and response.
- Email security incident handling and response.
- Network security incident handling and response.
- Handling and responding to web application security incidents.
- Manage and respond to cloud security incidents.
- Manage and respond to insider threats.
Pedagogical details
Training architecture
Learn the best ways to manage and respond to cyberattacks through numerous lab exercises, in order to be able to restore the normal operation of the organization as soon as possible and mitigate the negative impact on business activities.
Training Notes
Cost of the exam included
Private or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quotePrivate or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quote