Belkasoft Training Course Bundles
In-depth Corporate Cyber Investigations with Belkasoft
This bundle is aimed at corporate cyber incident responders and includes the following 3 courses:
- Incident investigations with Belkasoft
- Maximizing DFIR Results with YARA, Sigma, and Belkasoft X
- Remote acquisition with Belkasoft
After completing these courses, will you be able to answer the following questions:
- What were the initial attack vectors that deployed malicious code into your infrastructure?
- What persistence methods were used by an adversary to maintain a presence within the system?
- What lateral movement techniques did they employ?
- How to interpret, construct, and tune Sigma rules?
- How to read and write YARA rules and improve their efficiency?
- What is Belkasoft R, and how to configure a server, and deploy remotely an agent on an endpoint, depending on the network configuration?
Using Belkasoft X, you can detect all these intricate tactics and other malicious activities. After successfully completing all the courses in this bundle, you will be able to answer all these and many other questions related to corporate cyber protection.
What does the bundle include?
- A 30-day trial license of Belkasoft X is provided
- Practical tasks
- Training materials including video tutorials, pre-recorded webinars, and articles are yours to keep
- Certificates of completion and achievement
- It can take up to a few days depending on the participant’s pace
Mobile Forensics with Belkasoft
This bundle is aimed at law enforcement and other government digital forensic investigators, as well as private sector examiners, and includes the following 3 courses:
- Android Forensics with Belkasoft
- iOS Forensics with Belkasoft
- SQLite forensics with Belkasoft
After completing these courses, will you be able to answer the following questions:
- How to acquire data from computer and mobile devices (both iOS and Android) using the dozens provided methods?
- How to acquire iOS data from the cloud
- How to use Belkasoft X Brute-Force tool to unlock certain models of mobile devices
- How to analyze mobile apps, including encrypted ones
- Which Android and iOS system files may be of interest for a DFIR investigation and how to analyze them
- Why is the SQLite format so widespread, and how WhatsApp, Viber, and other popular apps store their data?
- How to locate deleted data inside an SQLite database
After successfully completing all the courses in this bundle, you will be able to answer all these and many other questions related to mobile digital forensics.
What does the bundle include?
- A 30-day trial license of Belkasoft X is provided
- Practical tasks
- Training materials including video tutorials, pre-recorded webinars, and articles are yours to keep
- Certificates of completion and achievement
- It can take up to a few days depending on the participant’s pace