The course is designed for those who aim to harden the cybersecurity of their business and learn how to enable a quick response to a variety of data breaches.
Another potential auditory for this course is CIRT/incident response team members, whose role is to take care of the company’s internal investigations,
including employee misconduct, trade secrets theft and so on. Corporate eDiscovery and cyber compliance specialists will find this course useful, too.
Participants will gain hands-on experience in using Belkasoft products for investigation of an insider threat.
Various anti-forensics techniques and methods of countering them will be considered during the course.
We know how valuable your time is and how difficult it is to plan.
This is why we prepared a course where you study in a safe, comfortable environment
and at times that are convenient for you.
This course materials can be accessed online anytime from September 20th to October 19th 2022.
In this training, you will learn:
How to analyze internet artifacts, such as emails and web browsing history
How to use Connection Graph in order to get an overview of connections (links between people) and their communications
How to analyze system artifacts, such as registry, Windows 10 Timeline and others
How to detect and counter various anti-forensics techniques
How to use carving techniques in order to recover deleted data from a hard drive and perform memory forensics
How to narrow your search using Timeline view and Hashset analysis