Post-Incident (Forensic) Analysis

Business Benefits:
  • The team will gain skills in securing digital evidence
  • Employees will learn how to analyze cyber incidents
  • The team will be able to analyze activity artifacts
  • Participants will learn data recovery methods
Participant Benefits:
  • Learning how to analyze and detect anomalies in large data sets related to malware infections
  • Ability to classify different attack phases
  • Understanding attack vectors and how to generate meaningful statistics
  • Gaining the ability to recognize cybercriminal activity
Sample Agenda:
  • Anatomy of hacking attacks
  • Security monitoring
  • Introduction to methodologies for securing data carriers
  • Ransomware infection analysis
  • Stealing malware infection analysis
  • RAM memory analysis in the context of incidents
  • Network traffic analysis related to attacker activity
  • Countermeasure techniques as a lesson learned
Our Trainers:
  • Rafał Gołębiowski – Head of Security
  • Bartłomiej Wierzbiński – Pentester

Additional information

Duration

2 days (14 hours)

Format

Case study, Exercises, Presentations

Language

English, Polish

Level

Advanced, Beginner, Intermediate

Tell us about your challenge, and we will find the right solution.​

Fill out the contact form

Contact details

TestArmy Group S.A. Petuniowa 9/5 53-238 Wrocław Poland

New Field

New Field