Event Type:
Tuesday Jul 31, 2018 - 12:00pm UTC to Friday Aug 03, 2018 - 09:00pm UTC
Event Description:
This course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises. Additional topics include key cybersecurity concepts and issues, as well as the various classifications and types of network attacks.
Course structure:
- Introduction to cybersecurity. Explore the cybersecurity threatscape, the Central Intelligence Agency Triad, and case studies.
- Network traffic analysis. Learn about the Open Systems Interconnection and Transmission Control Protocol/Internet Protocol models, as well as monitoring, capturing, and parsing artifacts from pocket capture files.
- Network attacks. Become familiar with attack types (insider threat, opportunistic, targeted, advanced persistent threats, blended attacks) and the examination of artifacts from keystroke logger, brute force attack, privilege escalation, remote access, data tampering, data exfiltration, botnet, and distributed denial-of-service attacks.
- Investigative techniques. Understand live machine triage, the order of volatility, capturing volatile data, and best practices for data analysis.
- Hands-on experience. Practice host machine triage, memory analysis, network traffic and log analysis, malware analysis, and virtual machine sandboxing.
Location:
4150 North Mulberry, Suite 250
2nd floor
Kansas City, MO
64116
United States
See map: Google Maps
Amount | Description |
---|---|
$0.00 | Free |
Space Available:
Yes
Category:
Program Areas: